thalesgroup.ciphertrust.dpg_access_policy_save module – Manage DPG access policies governing data access
Note
This module is part of the thalesgroup.ciphertrust collection (version 1.0.2).
It is not included in ansible-core
.
To check whether it is installed, run ansible-galaxy collection list
.
To install it, use: ansible-galaxy collection install thalesgroup.ciphertrust
.
To use it in a playbook, specify: thalesgroup.ciphertrust.dpg_access_policy_save
.
New in thalesgroup.ciphertrust 1.0.0
Synopsis
This is a Thales CipherTrust Manager module for working with the CipherTrust Manager APIs, more specifically with DPG Access Policy API
Refer https://thalesdocs.com/ctp/con/dpg/latest/admin/index.html for API documentation
Parameters
Parameter |
Comments |
---|---|
Value to be revealed if the type is ‘Error Replacement Value’ |
|
Masking format used to reveal if the type is ‘Masked Value’ |
|
Value using which data should be revealed Choices:
|
|
Description of the Access Policy |
|
Value to be revealed if the type is ‘Error Replacement Value’ |
|
this holds the connection parameters required to communicate with an instance of CipherTrust Manager (CM) holds IP/FQDN of the server, username, password, and port |
|
user’s domain path |
|
admin password of CM |
|
CM Server IP or FQDN |
|
Port on which CM server is listening |
|
internal or private IP of the CM Server, if different from the server_ip |
|
admin username of CM |
|
if SSL verification is required Choices:
|
|
Masking format used to reveal if the type is ‘Masked Value’ |
|
Access Policy Name |
|
Operation to be performed Choices:
|
|
Identifier of the access policy to be patched |
|
Update or delete the user set in an Access Policy |
|
Value using which data should be revealed Choices:
|
|
User set to which the policy is applied. |
|
List of policies to be added to the access policy |
|
Value to be revealed if the type is ‘Error Replacement Value’ |
|
Masking format used to reveal if the type is ‘Masked Value’ |
|
Value using which data should be revealed Choices:
|
|
User set to which the policy is applied. |
Examples
- name: "Create Access Policy"
thalesgroup.ciphertrust.dpg_access_policy_save:
localNode:
server_ip: "IP/FQDN of CipherTrust Manager"
server_private_ip: "Private IP in case that is different from above"
server_port: 5432
user: "CipherTrust Manager Username"
password: "CipherTrust Manager Password"
verify: false
auth_domain_path: domain
op_type: create
name: DemoAccessPolicy
default_reveal_type: "Ciphertext"
user_set_policy:
- reveal_type: Plaintext
user_set_id: <UserSetID>
- reveal_type: Ciphertext
user_set_id: <UserSetID>
- name: "Patch Access Policy"
thalesgroup.ciphertrust.dpg_access_policy_save:
localNode:
server_ip: "IP/FQDN of CipherTrust Manager"
server_private_ip: "Private IP in case that is different from above"
server_port: 5432
user: "CipherTrust Manager Username"
password: "CipherTrust Manager Password"
verify: false
auth_domain_path: domain
op_type: patch
policy_id: <accessPolicyID>
name: DemoAccessPolicyUPD
description: "Updated via Ansible"
default_reveal_type: Plaintext
- name: "Add UserSet to Access Policy"
thalesgroup.ciphertrust.dpg_access_policy_save:
op_type: add-user-set
policy_id: <accessPolicyID>
reveal_type: Plaintext
user_set_id: <UserSetID>
localNode:
server_ip: "IP/FQDN of CipherTrust Manager"
server_private_ip: "Private IP in case that is different from above"
server_port: 5432
user: "CipherTrust Manager Username"
password: "CipherTrust Manager Password"
verify: false
auth_domain_path: domain
- name: "Update UserSet in Access Policy"
thalesgroup.ciphertrust.dpg_access_policy_save:
op_type: update-user-set
policy_id: <accessPolicyID>
policy_user_set_id: <UserSetID>
reveal_type: Plaintext
localNode:
server_ip: "IP/FQDN of CipherTrust Manager"
server_private_ip: "Private IP in case that is different from above"
server_port: 5432
user: "CipherTrust Manager Username"
password: "CipherTrust Manager Password"
verify: false
auth_domain_path: domain
- name: "Delete Access Policy"
thalesgroup.ciphertrust.cm_resource_delete:
key: <accessPolicyID>
resource_type: "access-policies"
localNode:
server_ip: "IP/FQDN of CipherTrust Manager"
server_private_ip: "Private IP in case that is different from above"
server_port: 5432
user: "CipherTrust Manager Username"
password: "CipherTrust Manager Password"
verify: false
auth_domain_path: domain