thalesgroup.ciphertrust.dpg_policy_save module – Manage DPG execution behavior for REST URLs and associated encryption parameters
Note
This module is part of the thalesgroup.ciphertrust collection (version 1.0.2).
It is not included in ansible-core
.
To check whether it is installed, run ansible-galaxy collection list
.
To install it, use: ansible-galaxy collection install thalesgroup.ciphertrust
.
To use it in a playbook, specify: thalesgroup.ciphertrust.dpg_policy_save
.
New in thalesgroup.ciphertrust 1.0.0
Synopsis
This is a Thales CipherTrust Manager module for working with the CipherTrust Manager APIs, more specifically with DPG policy API
Refer https://thalesdocs.com/ctp/con/dpg/latest/admin/index.html for API documentation
Parameters
Parameter |
Comments |
---|---|
URL of the application server from which the request will received. |
|
API URL ID to be updated |
|
Description of the DPG policy |
|
URL of the application server where the request will be served. |
|
API tokens to be protected in a DELETE Request |
|
Access Policy to be associated |
|
Opetional external version header |
|
Name |
|
API Operation |
|
Protection Policy to be associated |
|
API tokens to be protected in a GET Request |
|
Access Policy to be associated |
|
Opetional external version header |
|
Name |
|
API Operation |
|
Protection Policy to be associated |
|
API tokens to be protected in a PATCH Request |
|
Access Policy to be associated |
|
Opetional external version header |
|
Name |
|
API Operation |
|
Protection Policy to be associated |
|
API tokens to be protected in a POST Request |
|
Access Policy to be associated |
|
Opetional external version header |
|
Name |
|
API Operation |
|
Protection Policy to be associated |
|
API tokens to be protected in a PUT Request |
|
Access Policy to be associated |
|
Opetional external version header |
|
Name |
|
API Operation |
|
Protection Policy to be associated |
|
API tokens to be protected in a DELETE Response |
|
Access Policy to be associated |
|
Opetional external version header |
|
Name |
|
API Operation |
|
Protection Policy to be associated |
|
API tokens to be protected in a GET Response |
|
Access Policy to be associated |
|
Opetional external version header |
|
Name |
|
API Operation |
|
Protection Policy to be associated |
|
API tokens to be protected in a PATCH Response |
|
Access Policy to be associated |
|
Opetional external version header |
|
Name |
|
API Operation |
|
Protection Policy to be associated |
|
API tokens to be protected in a POST Response |
|
Access Policy to be associated |
|
Opetional external version header |
|
Name |
|
API Operation |
|
Protection Policy to be associated |
|
API tokens to be protected in a PUT Response |
|
Access Policy to be associated |
|
Opetional external version header |
|
Name |
|
API Operation |
|
Protection Policy to be associated |
|
this holds the connection parameters required to communicate with an instance of CipherTrust Manager (CM) holds IP/FQDN of the server, username, password, and port |
|
user’s domain path |
|
admin password of CM |
|
CM Server IP or FQDN |
|
Port on which CM server is listening |
|
internal or private IP of the CM Server, if different from the server_ip |
|
admin username of CM |
|
if SSL verification is required Choices:
|
|
Name of the DPG policy |
|
Operation to be performed Choices:
|
|
Identifier of the DPG Policy to be patched |
|
List of API urls to be added to the proxy configuration |
|
URL of the application server from which the request will received. |
|
URL of the application server where the request will be served. |
|
API tokens to be protected in a DELETE Request |
|
Access Policy to be associated |
|
Opetional external version header |
|
Name |
|
API Operation |
|
Protection Policy to be associated |
|
API tokens to be protected in a GET Request |
|
Access Policy to be associated |
|
Opetional external version header |
|
Name |
|
API Operation |
|
Protection Policy to be associated |
|
API tokens to be protected in a PATCH Request |
|
Access Policy to be associated |
|
Opetional external version header |
|
Name |
|
API Operation |
|
Protection Policy to be associated |
|
API tokens to be protected in a POST Request |
|
Access Policy to be associated |
|
Opetional external version header |
|
Name |
|
API Operation |
|
Protection Policy to be associated |
|
API tokens to be protected in a PUT Request |
|
Access Policy to be associated |
|
Opetional external version header |
|
Name |
|
API Operation |
|
Protection Policy to be associated |
|
API tokens to be protected in a DELETE Response |
|
Access Policy to be associated |
|
Opetional external version header |
|
Name |
|
API Operation |
|
Protection Policy to be associated |
|
API tokens to be protected in a GET Response |
|
Access Policy to be associated |
|
Opetional external version header |
|
Name |
|
API Operation |
|
Protection Policy to be associated |
|
API tokens to be protected in a PATCH Response |
|
Access Policy to be associated |
|
Opetional external version header |
|
Name |
|
API Operation |
|
Protection Policy to be associated |
|
API tokens to be protected in a POST Response |
|
Access Policy to be associated |
|
Opetional external version header |
|
Name |
|
API Operation |
|
Protection Policy to be associated |
|
API tokens to be protected in a PUT Response |
|
Access Policy to be associated |
|
Opetional external version header |
|
Name |
|
API Operation |
|
Protection Policy to be associated |
|
API tokens to be protected in a DELETE Request |
|
Access Policy to be associated |
|
Opetional external version header |
|
Name |
|
API Operation |
|
Protection Policy to be associated |
|
API tokens to be protected in a GET Request |
|
Access Policy to be associated |
|
Opetional external version header |
|
Name |
|
API Operation |
|
Protection Policy to be associated |
|
API tokens to be protected in a PATCH Request |
|
Access Policy to be associated |
|
Opetional external version header |
|
Name |
|
API Operation |
|
Protection Policy to be associated |
|
API tokens to be protected in a POST Request |
|
Access Policy to be associated |
|
Opetional external version header |
|
Name |
|
API Operation |
|
Protection Policy to be associated |
|
API tokens to be protected in a PUT Request |
|
Access Policy to be associated |
|
Opetional external version header |
|
Name |
|
API Operation |
|
Protection Policy to be associated |
|
API tokens to be protected in a DELETE Request |
|
Access Policy to be associated |
|
Opetional external version header |
|
Name |
|
API Operation |
|
Protection Policy to be associated |
|
API tokens to be protected in a GET Request |
|
Access Policy to be associated |
|
Opetional external version header |
|
Name |
|
API Operation |
|
Protection Policy to be associated |
|
API tokens to be protected in a PATCH Request |
|
Access Policy to be associated |
|
Opetional external version header |
|
Name |
|
API Operation |
|
Protection Policy to be associated |
|
API tokens to be protected in a POST Request |
|
Access Policy to be associated |
|
Opetional external version header |
|
Name |
|
API Operation |
|
Protection Policy to be associated |
|
API tokens to be protected in a PUT Request |
|
Access Policy to be associated |
|
Opetional external version header |
|
Name |
|
API Operation |
|
Protection Policy to be associated |
Examples
- name: "Create DPG Policy"
thalesgroup.ciphertrust.dpg_policy_save:
localNode:
server_ip: "IP/FQDN of CipherTrust Manager"
server_private_ip: "Private IP in case that is different from above"
server_port: 5432
user: "CipherTrust Manager Username"
password: "CipherTrust Manager Password"
verify: false
auth_domain_path:
op_type: create
name: DPGPolicyName
proxy_config:
- api_url: "/api/sample/resource/id"
destination_url: "http://localhost:8080"
json_request_post_tokens:
- name: "creditCard.[*].CCNumber"
operation: "protect"
protection_policy: "CC_ProtectionPolicy"
- name: "creditCard.[*].cvv"
operation: "protect"
protection_policy: "cvv_ProtectionPolicy"
json_response_get_tokens:
- name: "creditCard.[*].cvv"
operation: "reveal"
protection_policy: "cvv_ProtectionPolicy"
access_policy: "cc_access_policy"
register: _result
- name: "Patch DPG Policy"
thalesgroup.ciphertrust.dpg_policy_save:
localNode:
server_ip: "IP/FQDN of CipherTrust Manager"
server_private_ip: "Private IP in case that is different from above"
server_port: 5432
user: "CipherTrust Manager Username"
password: "CipherTrust Manager Password"
verify: false
auth_domain_path:
op_type: patch
policy_id: <DPGPolicyID>
description: "Updated via Ansible"
- name: "Add api_url to DPG Policy"
thalesgroup.ciphertrust.dpg_policy_save:
localNode:
server_ip: "IP/FQDN of CipherTrust Manager"
server_private_ip: "Private IP in case that is different from above"
server_port: 5432
user: "CipherTrust Manager Username"
password: "CipherTrust Manager Password"
verify: false
auth_domain_path:
op_type: add-api-url
policy_id: <DPGPolicyID>
api_url: "/api/v2/sample/resource/id"
destination_url: "http://localhost:8080"
json_request_post_tokens:
- name: "creditCard.[*].cvv"
operation: "protect"
protection_policy: "cvv_ProtectionPolicy"
- name: "Update api_url in DPG Policy"
thalesgroup.ciphertrust.dpg_policy_save:
localNode:
server_ip: "IP/FQDN of CipherTrust Manager"
server_private_ip: "Private IP in case that is different from above"
server_port: 5432
user: "CipherTrust Manager Username"
password: "CipherTrust Manager Password"
verify: false
auth_domain_path:
op_type: update-api-url
policy_id: <DPGPolicyID>
api_url_id: <API_URL_ID>
destination_url: "http://localhost:8081"
- name: "Delete api_url from DPG Policy"
thalesgroup.ciphertrust.dpg_policy_save:
localNode:
server_ip: "IP/FQDN of CipherTrust Manager"
server_private_ip: "Private IP in case that is different from above"
server_port: 5432
user: "CipherTrust Manager Username"
password: "CipherTrust Manager Password"
verify: false
auth_domain_path:
op_type: delete-api-url
policy_id: <DPGPolicyID>
api_url_id: <API_URL_ID>
- name: "Delete DPG Policy by ID"
thalesgroup.ciphertrust.cm_resource_delete:
key: <DPGPolicyID>
resource_type: "dpg-policies"
localNode:
server_ip: "IP/FQDN of CipherTrust Manager"
server_private_ip: "Private IP in case that is different from above"
server_port: 5432
user: "CipherTrust Manager Username"
password: "CipherTrust Manager Password"
verify: false
auth_domain_path: