chillancezen / chillancezen.fortimanager / 2.1.6 / module / fmgr_user_group_dynamicmapping no description | "added in version" 1.0.0 of chillancezen.fortimanager" Authors: Link Zheng (@chillancezen), Jie Xue (@JieX19), Frank Shen (@fshen01), Hongbin Lu (@fgtdev-hblu) preview | supported by communitychillancezen.fortimanager.fmgr_user_group_dynamicmapping (2.1.6) — module
Install with ansible-galaxy collection install chillancezen.fortimanager:==2.1.6
collections: - name: chillancezen.fortimanager version: 2.1.6
This module is able to configure a FortiManager device.
Examples include all parameters and values which need to be adjusted to data sources before usage.
- hosts: fortimanager-inventory collections: - fortinet.fortimanager connection: httpapi vars: ansible_httpapi_use_ssl: True ansible_httpapi_validate_certs: False ansible_httpapi_port: 443 tasks: - name: no description fmgr_user_group_dynamicmapping: bypass_validation: False workspace_locking_adom: <value in [global, custom adom including root]> workspace_locking_timeout: 300 rc_succeeded: [0, -2, -3, ...] rc_failed: [-2, -3, ...] adom: <your own value> group: <your own value> state: <value in [present, absent]> user_group_dynamicmapping: _scope: - name: <value of string> vdom: <value of string> auth-concurrent-override: <value in [disable, enable]> auth-concurrent-value: <value of integer> authtimeout: <value of integer> company: <value in [optional, mandatory, disabled]> email: <value in [disable, enable]> expire: <value of integer> expire-type: <value in [immediately, first-successful-login]> group-type: <value in [firewall, directory-service, fsso-service, ...]> guest: - comment: <value of string> company: <value of string> email: <value of string> expiration: <value of string> group: <value of string> id: <value of integer> mobile-phone: <value of string> name: <value of string> password: <value of string> sponsor: <value of string> user-id: <value of string> http-digest-realm: <value of string> id: <value of integer> ldap-memberof: <value of string> logic-type: <value in [or, and]> match: - _gui_meta: <value of string> group-name: <value of string> id: <value of integer> server-name: <value of string> max-accounts: <value of integer> member: <value of string> mobile-phone: <value in [disable, enable]> multiple-guest-add: <value in [disable, enable]> password: <value in [auto-generate, specify, disable]> redir-url: <value of string> sms-custom-server: <value of string> sms-server: <value in [fortiguard, custom]> sponsor: <value in [optional, mandatory, disabled]> sslvpn-bookmarks-group: <value of string> sslvpn-cache-cleaner: <value in [disable, enable]> sslvpn-client-check: - forticlient - forticlient-av - forticlient-fw - 3rdAV - 3rdFW sslvpn-ftp: <value in [disable, enable]> sslvpn-http: <value in [disable, enable]> sslvpn-os-check: <value in [disable, enable]> sslvpn-os-check-list: action: <value in [allow, check-up-to-date, deny]> latest-patch-level: <value of string> name: <value of string> tolerance: <value of integer> sslvpn-portal: <value of string> sslvpn-portal-heading: <value of string> sslvpn-rdp: <value in [disable, enable]> sslvpn-samba: <value in [disable, enable]> sslvpn-split-tunneling: <value in [disable, enable]> sslvpn-ssh: <value in [disable, enable]> sslvpn-telnet: <value in [disable, enable]> sslvpn-tunnel: <value in [disable, enable]> sslvpn-tunnel-endip: <value of string> sslvpn-tunnel-ip-mode: <value in [range, usrgrp]> sslvpn-tunnel-startip: <value of string> sslvpn-virtual-desktop: <value in [disable, enable]> sslvpn-vnc: <value in [disable, enable]> sslvpn-webapp: <value in [disable, enable]> sso-attribute-value: <value of string> user-id: <value in [email, auto-generate, specify]> user-name: <value in [disable, enable]>
request_url: description: The full url requested returned: always sample: /sys/login/user type: str response_code: description: The status of api request returned: always sample: 0 type: int response_message: description: The descriptive message of the api response returned: always sample: OK. type: str