thalesgroup.ciphertrust.dpg_client_profile_save module – Manage DPG client profile
Note
This module is part of the thalesgroup.ciphertrust collection (version 1.0.2).
It is not included in ansible-core
.
To check whether it is installed, run ansible-galaxy collection list
.
To install it, use: ansible-galaxy collection install thalesgroup.ciphertrust
.
To use it in a playbook, specify: thalesgroup.ciphertrust.dpg_client_profile_save
.
New in thalesgroup.ciphertrust 1.0.0
Synopsis
This is a Thales CipherTrust Manager module for working with the CipherTrust Manager APIs, more specifically with DPG Client Profile API
Refer https://thalesdocs.com/ctp/con/dpg/latest/admin/index.html for API documentation
Parameters
Parameter |
Comments |
---|---|
App connector type for which the client profile is created Choices:
|
|
Local CA mapped with client profile |
|
Duration for which client credentials are valid |
|
Parameters required to initialize connector |
|
used to define how and from where to validate the application user |
|
the type of authentication scheme to be used to fetch the suer Options Choices:
|
|
the json field which have the user information. Required when scheme_name is Bearer. |
|
The time a connection is allowed to be idle in the connection pool before it gets automatically closed Default: |
|
Read timeout value for clients Default: |
|
The amount of time to wait before trying to reconnect to a disabled server Default: |
|
Connection timeout value for clients Default: |
|
Specifies the interval (in seconds) between keep-alive probes for an active network connection. |
|
Specifies the maximum duration (in seconds) the DPG server will wait for a connection with the Application Server to succeed |
|
Flag used to enable clients to create a performance metrics Default is true Choices:
|
|
Frequency interval for sending heartbeat by connectors Default: |
|
heartbeat timeout missed communication counts with CM for connectors to decide on cleanup profile cache Default: |
|
Information about the the JWT validation |
|
String that identifies the principal that issued the JWT If empty, the iss (issuer) field in the JWT won’t be checked. |
|
Determines how the client selects a Key Manager from a load balancing group Choices:
|
|
This value specifies the path where log file will be created |
|
This value specifies if timestamp in logs should be formatted in GMT or not. Default disabled Choices:
|
|
The level of logging to determine verbosity of clients logs Choices:
|
|
Specifies how frequently the log file is rotated Choices:
|
|
Determines how the client selects a Key Manager from a load balancing group Default: |
|
Type of the log Choices:
|
|
The maximum number of connections that can persist in connection pool Default: |
|
Whether the symmetric key cache is enabled Choices:
|
|
Time after which the symmetric key cache will expire Default: |
|
TLS to app server configuration |
|
TLS enabled flag Choices:
|
|
skip verification flag Choices:
|
|
Client certificate parameters to be updated |
|
City Name |
|
Common Name |
|
Country Name |
|
Organization Name |
|
Organizational Unit Name |
|
State Name |
|
Flag used to check client autorenewal is enabled or not Default value is false |
|
List of the groups in which client will be added during registration |
|
The Threshold by which client’s connectivity_status will be moved to Error if not heartbeat is received |
|
PEM encoded PKCS#1 or PKCS#8 Public key used to validate a JWT |
|
Validity of registration token |
|
this holds the connection parameters required to communicate with an instance of CipherTrust Manager (CM) holds IP/FQDN of the server, username, password, and port |
|
user’s domain path |
|
admin password of CM |
|
CM Server IP or FQDN |
|
Port on which CM server is listening |
|
internal or private IP of the CM Server, if different from the server_ip |
|
admin username of CM |
|
if SSL verification is required Choices:
|
|
Number of clients that can register using a registration token |
|
Nae interface mapped with client profile |
|
Unique name for the client profile. |
|
Operation to be performed Choices:
|
|
Policy mapped with client profile. |
|
Identifier of the client profile to be patched |
Examples
- name: "Create DPG Client Profile"
thalesgroup.ciphertrust.dpg_client_profile_save:
localNode:
server_ip: "IP/FQDN of CipherTrust Manager"
server_private_ip: "Private IP in case that is different from above"
server_port: 5432
user: "CipherTrust Manager Username"
password: "CipherTrust Manager Password"
verify: false
auth_domain_path:
name: DPGClientProfile
op_type: create
app_connector_type: DPG
lifetime: 30d
cert_duration: 730
max_clients: 200
ca_id: <CA_UUID>
nae_iface_port: 9005
csr_parameters:
csr_cn: admin
policy_id: <DPGPolicyID>
- name: "Patch DPG Client Profile"
thalesgroup.ciphertrust.dpg_client_profile_save:
localNode:
server_ip: "IP/FQDN of CipherTrust Manager"
server_private_ip: "Private IP in case that is different from above"
server_port: 5432
user: "CipherTrust Manager Username"
password: "CipherTrust Manager Password"
verify: false
auth_domain_path:
op_type: patch
profile_id: <DPGClientProfileID>
lifetime: 180d