Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Documentation only: Added fqcn to examples #62

Open
wants to merge 1 commit into
base: master
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
6 changes: 3 additions & 3 deletions docs/cyberark_authentication.md
Original file line number Diff line number Diff line change
Expand Up @@ -75,7 +75,7 @@ In addition to SSL, use Client Authentication to authenticate Ansible using a cl

```yaml
- name: Logon to CyberArk Vault using PAS Web Services SDK - use_shared_logon_authentication
cyberark_authentication:
cyberark.pas.cyberark_authentication:
api_base_url: "{{ web_services_base_url }}"
use_shared_logon_authentication: true
```
Expand All @@ -87,7 +87,7 @@ Users can authenticate using **CyberArk**, **LDAP** or **RADIUS** authentication

```yaml
- name: Logon to CyberArk Vault using PAS Web Services SDK - Not use_shared_logon_authentication
cyberark_authentication:
cyberark.pas.cyberark_authentication:
api_base_url: "{{ web_services_base_url }}"
username: "{{ password_object.password }}"
password: "{{ password_object.passprops.username }}"
Expand All @@ -98,7 +98,7 @@ This method logs off the user and removes the Vault session.

```yaml
- name: Logoff from CyberArk Vault
cyberark_authentication:
cyberark.pas.cyberark_authentication:
state: absent
cyberark_session: "{{ cyberark_session }}
```
4 changes: 2 additions & 2 deletions docs/cyberark_credential.md
Original file line number Diff line number Diff line change
Expand Up @@ -97,7 +97,7 @@ options:

```yaml
- name: credential retrieval basic
cyberark_credential:
cyberark.pas.cyberark_credential:
api_base_url: "http://10.10.0.1"
app_id: "TestID"
query: "Safe=test;UserName=admin"
Expand All @@ -108,7 +108,7 @@ options:


- name: credential retrieval advanced
cyberark_credential:
cyberark.pas.cyberark_credential:
api_base_url: "https://components.cyberark.local"
validate_certs: true
client_cert: /etc/pki/ca-trust/source/client.pem
Expand Down
18 changes: 9 additions & 9 deletions docs/cyberark_user.md
Original file line number Diff line number Diff line change
Expand Up @@ -96,12 +96,12 @@ This playbook will check if username `admin` exists, if it does not, it will pro

```yaml
- name: Logon to CyberArk Vault using PAS Web Services SDK
cyberark_authentication:
cyberark.pas.cyberark_authentication:
api_base_url: https://components.cyberark.local
use_shared_logon_authentication: true

- name: Create user, add to Group
cyberark_user:
cyberark.pas.cyberark_user:
username: admin
first_name: "Cyber"
last_name: "Admin"
Expand All @@ -115,7 +115,7 @@ This playbook will check if username `admin` exists, if it does not, it will pro
register: cyberarkaction

- name: Logoff from CyberArk Vault
cyberark_authentication:
cyberark.pas.cyberark_authentication:
state: absent
cyberark_session: '{{ cyberark_session }}'
```
Expand All @@ -124,40 +124,40 @@ This playbook will identify the user and delete it from the CyberArk Vault based

```yaml
- name: Logon to CyberArk Vault using PAS Web Services SDK - use_shared_logon_authentication
cyberark_authentication:
cyberark.pas.cyberark_authentication:
api_base_url: "{{ web_services_base_url }}"
use_shared_logon_authentication: true

- name: Removing a CyberArk User
cyberark_user:
cyberark.pas.cyberark_user:
username: "ansibleuser"
state: absent
cyberark_session: "{{ cyberark_session }}"
register: cyberarkaction

- name: Logoff from CyberArk Vault
cyberark_authentication:
cyberark.pas.cyberark_authentication:
state: absent
cyberark_session: "{{ cyberark_session }}"
```
This playbook is an example of disabling a user based on the `disabled: true` value with that authentication using the credential set in Tower.
```yaml
- name: Logon to CyberArk Vault using PAS Web Services SDK - Not use_shared_logon_authentication
cyberark_authentication:
cyberark.pas.cyberark_authentication:
api_base_url: "{{ web_services_base_url }}"
username: "{{ password_object.password }}"
password: "{{ password_object.passprops.username }}"
use_shared_logon_authentication: false

- name: Disabling a CyberArk User
cyberark_user:
cyberark.pas.cyberark_user:
username: "ansibleuser"
disabled: true
cyberark_session: "{{ cyberark_session }}"
register: cyberarkaction

- name: Logoff from CyberArk Vault
cyberark_authentication:
cyberark.pas.cyberark_authentication:
state: absent
cyberark_session: "{{ cyberark_session }}"
```