fortinet / fortinet.fortios / 2.3.6 / module / fortios_user_krb_keytab Configure Kerberos keytab entries in Fortinet's FortiOS and FortiGate. | "added in version" 2.0.0 of fortinet.fortios" Authors: Link Zheng (@chillancezen), Jie Xue (@JieX19), Hongbin Lu (@fgtdev-hblu), Frank Shen (@frankshen01), Miguel Angel Munoz (@mamunozgonzalez), Nicolas Thomas (@thomnico) preview | supported by communityfortinet.fortios.fortios_user_krb_keytab (2.3.6) — module
Install with ansible-galaxy collection install fortinet.fortios:==2.3.6
collections: - name: fortinet.fortios version: 2.3.6
This module is able to configure a FortiGate or FortiOS (FOS) device by allowing the user to set and modify user feature and krb_keytab category. Examples include all parameters and values need to be adjusted to datasources before usage. Tested with FOS v6.0.0
- name: Configure Kerberos keytab entries. fortinet.fortios.fortios_user_krb_keytab: vdom: "{{ vdom }}" state: "present" access_token: "<your_own_value>" user_krb_keytab: keytab: "<your_own_value>" ldap_server: - name: "default_name_5 (source user.ldap.name)" name: "default_name_6" pac_data: "enable" password: "<your_own_value>" principal: "<your_own_value>"
vdom: default: root description: - Virtual domain, among those defined previously. A vdom is a virtual instance of the FortiGate that can be configured and used as a different unit. type: str state: choices: - present - absent description: - Indicates whether to create or remove the object. required: true type: str enable_log: default: false description: - Enable/Disable logging for task. required: false type: bool member_path: description: - Member attribute path to operate on. - Delimited by a slash character if there are more than one attribute. - Parameter marked with member_path is legitimate for doing member operation. type: str access_token: description: - Token-based authentication. Generated from GUI of Fortigate. required: false type: str member_state: choices: - present - absent description: - Add or delete a member under specified attribute path. - When member_state is specified, the state option is ignored. type: str user_krb_keytab: default: null description: - Configure Kerberos keytab entries. suboptions: keytab: description: - Base64 coded keytab file containing a pre-shared key. type: str ldap_server: description: - LDAP server name(s). Source user.ldap.name. elements: dict suboptions: name: description: - LDAP server name. Source user.ldap.name. required: true type: str type: list name: description: - Kerberos keytab entry name. required: true type: str pac_data: choices: - enable - disable description: - Enable/disable parsing PAC data in the ticket. type: str password: description: - Password for keytab. type: str principal: description: - Kerberos service principal. For example, HTTP/myfgt.example.com@example.com. type: str type: dict
build: description: Build number of the fortigate image returned: always sample: '1547' type: str http_method: description: Last method used to provision the content into FortiGate returned: always sample: PUT type: str http_status: description: Last result given by FortiGate on last operation applied returned: always sample: '200' type: str mkey: description: Master key (id) used in the last call to FortiGate returned: success sample: id type: str name: description: Name of the table used to fulfill the request returned: always sample: urlfilter type: str path: description: Path of the table used to fulfill the request returned: always sample: webfilter type: str revision: description: Internal revision number returned: always sample: 17.0.2.10658 type: str serial: description: Serial number of the unit returned: always sample: FGVMEVYYQT3AB5352 type: str status: description: Indication of the operation's result returned: always sample: success type: str vdom: description: Virtual domain used returned: always sample: root type: str version: description: Version of the FortiGate returned: always sample: v5.6.3 type: str