yadro.tatlin_uni.tatlin_sp_ldap module – Configure SP LDAP client settings.
Note
This module is part of the yadro.tatlin_uni collection (version 1.0.0).
You might already have this collection installed if you are using the ansible
package.
It is not included in ansible-core
.
To check whether it is installed, run ansible-galaxy collection list
.
To install it, use: ansible-galaxy collection install yadro.tatlin_uni
.
To use it in a playbook, specify: yadro.tatlin_uni.tatlin_sp_ldap
.
New in version 1.0.0: of yadro.tatlin_uni
Synopsis
This module is intended to configure ldap settings for Storage Processor.
Supports check mode
Parameters
Parameter |
Comments |
---|---|
Ldap server’s base dn for search |
|
connection describes Tatlin Storage Processor (SP) connection configuration. Only session connection supported. Authorization is executed automatically with corresponding endpoint. ‘auth/login’ by default. Client receives x-auth-token and uses it for following requests. |
|
Tatlin REST API entrypoint. |
|
Tatlin user password. |
|
Tatlin REST API request timeout. Default: 60 |
|
Tatlin username to login. |
|
Responsible for SSL certificates validation. If set to False certificates won’t validated. Choices:
|
|
Content of ldap server’s certificate Required if (I)encryption is (C)ssl or (C)tls Mutually exclusive with (I)crt_path |
|
Path to ldap server’s certificate Required if (I)encryption is (C)ssl or (C)tls Mutually exclusive with (I)crt_content |
|
Encryption mode If ldap is encrypted ((C)ssl or (C)tls), certificate must be passed. If ldap was already configured as encrypted and one or several fields are updated (for example (I)search_filter) (I)crt_path or (I)crt_content must be passed. Otherwise an operation will be failed Choices:
|
|
Group attribute for search Prohibited if (I)type is (C)ad |
|
Ldap server’s address |
|
Password for lookup user Required if (I)state is (C)present |
|
Name of lookup user |
|
Ldap server’s port |
|
Filter in RFC 4515 format |
|
Ldap server’s type Choices:
|
|
Ldap server’s type Choices:
|
|
User attribute for search Prohibited if (I)type is (C)ad |
Examples
---
- name: Add ldap config
yadro.tatlin_uni.tatlin_sp_ldap:
connection: "{{ connection }}"
host: "{{ ldap_host }}"
port: 389
lookup_user: cn=admin,dc=example,dc=com
lookup_password: password
base_dn: dc=example,dc=com
search_filter: "(memberof=cn=Users,dc=example,dc=com)"
encryption: off
user_attribute: cn
group_attribute: cn
type: custom
- name: Change search filter
yadro.tatlin_uni.tatlin_sp_ldap:
connection: "{{ connection }}"
lookup_password: password
search_filter: (uid=*)
- name: Enable tls encryption
yadro.tatlin_uni.tatlin_sp_ldap:
connection: "{{ connection }}"
lookup_password: password
encryption: tls
port: 389
crt_path: /path/to/certificate.pem
- name: Add AD config with ssl encryption
yadro.tatlin_uni.tatlin_sp_ldap:
connection: "{{ connection }}"
host: "{{ ldap_host }}"
port: 636
lookup_user: cn=admin,dc=example,dc=com
lookup_password: password
base_dn: dc=example,dc=com
search_filter: "(memberof=cn=Users,dc=example,dc=com)"
encryption: ssl
crt_content: |
-----BEGIN CERTIFICATE-----
MIIDuz...
type: ad
Return Values
Common return values are documented here, the following are the fields unique to this module:
Key |
Description |
---|---|
Error details if raised Returned: on error |
|
Operation status message Returned: always |