cisco.ise.active_directory_add_groups module – Resource module for Active Directory Add Groups
Note
This module is part of the cisco.ise collection (version 2.9.6).
You might already have this collection installed if you are using the ansible package.
It is not included in ansible-core.
To check whether it is installed, run ansible-galaxy collection list.
To install it, use: ansible-galaxy collection install cisco.ise.
You need further requirements to be able to use this module,
see Requirements for details.
To use it in a playbook, specify: cisco.ise.active_directory_add_groups.
New in cisco.ise 1.0.0
Synopsis
- Manage operation update of the resource Active Directory Add Groups. 
- This API loads domain groups configuration from Active Directory into Cisco. 
Note
This module has a corresponding action plugin.
Requirements
The below requirements are needed on the host that executes this module.
- ciscoisesdk >= 2.2.3 
- python >= 3.5 
Parameters
| Parameter | Comments | 
|---|---|
| Holds list of AD Attributes. | |
| List of Attributes. | |
| Required for each attribute in the attribute list. Can contain an empty string. All characters are allowed except <%”. | |
| Required for each attribute in the attribute list. All characters are allowed except <%”. | |
| Required for each attribute in the attribute list with no duplication between attributes. All characters are allowed except <%”. | |
| Required for each group in the group list. Allowed values STRING, IP, BOOLEAN, INT, OCTET_STRING. | |
| Holds list of AD Groups. | |
| List of Groups. | |
| Required for each group in the group list with no duplication between groups. All characters are allowed except %. | |
| Cisco ISE uses security identifiers (SIDs) for optimization of group membership evaluation. SIDs are useful for efficiency (speed) when the groups are evaluated. All characters are allowed except %. | |
| No character restriction. | |
| String that contains the names of the scopes that the active directory belongs to. Names are separated by comma. Alphanumeric, underscore (_) characters are allowed. | |
| Active Directory Add Groups’s advancedSettings. | |
| Range 1-8760 hours. | |
| Enable prevent AD account lockout. Allowed values - WIRELESS, - WIRED, - BOTH. | |
| User info attribute. All characters are allowed except %. | |
| User info attribute. All characters are allowed except %. | |
| User info attribute. All characters are allowed except %. | |
| EnableCallbackForDialinClient flag. Choices: 
 | |
| EnableDialinPermissionCheck flag. Choices: 
 | |
| Enable prevent AD account lockout due to too many bad password attempts. Choices: 
 | |
| EnableMachineAccess flag. Choices: 
 | |
| EnableMachineAuth flag. Choices: 
 | |
| EnablePassChange flag. Choices: 
 | |
| EnableRewrites flag. Choices: 
 | |
| Number of bad password attempts. | |
| User info attribute. All characters are allowed except %. | |
| Allowed values REJECT, SEARCH_JOINED_FOREST, SEARCH_ALL. | |
| User info attribute. All characters are allowed except %. | |
| User info attribute. All characters are allowed except %. | |
| User info attribute. All characters are allowed except %. | |
| User info attribute. All characters are allowed except %. | |
| PlaintextAuth flag. Choices: 
 | |
| Identity rewrite is an advanced feature that directs Cisco ISE to manipulate the identity before it is passed to the external Active Directory system. You can create rules to change the identity to a desired format that includes or excludes a domain prefix and/or suffix or other additional markup of your choice. | |
| Required for each rule in the list with no duplication between rules. All characters are allowed except %”. | |
| Required for each rule in the list. All characters are allowed except %”. | |
| Required for each rule in the list in serial order. | |
| Allowed values ACTIVE_DIRECTORY, CUSTOM. Choose ACTIVE_DIRECTORY schema when the AD attributes defined in AD can be copied to relevant attributes in Cisco ISE. If customization is needed, choose CUSTOM schema. All User info attributes are always set to default value if schema is ACTIVE_DIRECTORY. Values can be changed only for CUSTOM schema. | |
| User info attribute. All characters are allowed except %. | |
| User info attribute. All characters are allowed except %. | |
| User info attribute. All characters are allowed except %. | |
| Allowed values PROCEED, DROP. | |
| No character restriction. | |
| The AD domain. Alphanumeric, hyphen (-) and dot (.) characters are allowed. | |
| EnableDomainWhiteList flag. Choices: 
 | |
| Resource UUID value. | |
| Flag for Identity Services Engine SDK to enable debugging. Choices: 
 | |
| The Identity Services Engine hostname. | |
| The Identity Services Engine password to authenticate. | |
| Timeout (in seconds) for RESTful HTTP requests. Default:  | |
| The Identity Services Engine username to authenticate. | |
| Flag that informs the SDK whether to use the Identity Services Engine’s API Gateway to send requests. If it is true, it uses the ISE’s API Gateway and sends requests to https://{{ise_hostname}}. If it is false, it sends the requests to https://{{ise_hostname}}:{{port}}, where the port value depends on the Service used (ERS, Mnt, UI, PxGrid). Choices: 
 | |
| Flag that informs the SDK whether we send the CSRF token to ISE’s ERS APIs. If it is True, the SDK assumes that your ISE CSRF Check is enabled. If it is True, it assumes you need the SDK to manage the CSRF token automatically for you. Choices: 
 | |
| Flag to enable or disable SSL certificate verification. Choices: 
 | |
| Informs the SDK which version of Identity Services Engine to use. Default:  | |
| Flag for Identity Services Engine SDK to enable automatic rate-limit handling. Choices: 
 | |
| Resource Name. Maximum 32 characters allowed. Allowed characters are alphanumeric and .-_/\\ characters. | 
Notes
Note
- SDK Method used are active_directory.ActiveDirectory.load_groups_from_domain, 
- Paths used are put /ers/config/activedirectory/{id}/addGroups, 
- Does not support - check_mode
- The plugin runs on the control node and does not use any ansible connection plugins, but instead the embedded connection manager from Cisco ISE SDK 
- The parameters starting with ise_ are used by the Cisco ISE Python SDK to establish the connection 
Examples
- name: Update all
  cisco.ise.active_directory_add_groups:
    ise_hostname: "{{ise_hostname}}"
    ise_username: "{{ise_username}}"
    ise_password: "{{ise_password}}"
    ise_verify: "{{ise_verify}}"
    adAttributes:
      attributes:
      - defaultValue: string
        internalName: string
        name: string
        type: string
    adScopesNames: string
    adgroups:
      groups:
      - name: string
        sid: string
        type: string
    advancedSettings:
      agingTime: 0
      authProtectionType: string
      country: string
      department: string
      email: string
      enableCallbackForDialinClient: true
      enableDialinPermissionCheck: true
      enableFailedAuthProtection: true
      enableMachineAccess: true
      enableMachineAuth: true
      enablePassChange: true
      enableRewrites: true
      failedAuthThreshold: 0
      firstName: string
      identityNotInAdBehaviour: string
      jobTitle: string
      lastName: string
      locality: string
      organizationalUnit: string
      plaintextAuth: true
      rewriteRules:
      - rewriteMatch: string
        rewriteResult: string
        rowId: 0
      schema: string
      stateOrProvince: string
      streetAddress: string
      telephone: string
      unreachableDomainsBehaviour: string
    description: string
    domain: string
    enableDomainWhiteList: true
    id: string
    name: string
Return Values
Common return values are documented here, the following are the fields unique to this module:
| Key | Description | 
|---|---|
| A dictionary or list with the response returned by the Cisco ISE Python SDK Returned: always Sample:  | 
