# Copyright 2021 Dell Inc. or its subsidiaries. All Rights Reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. --- ### Usage: idrac_2fa ### # Specify 2FA related paramters when two_factor_authentication is enabled in idrac_vars.yml # By default two factor authentication will be "disabled" # If required it can be "enabled" in idrac_vars.yml # [WARNING] Once 2FA is enabled, user has to disable 2FA manually. Other iDRAC playbooks won't run if 2FA is enabled # The SMTP server details should be valid. # 2FA will be enabled only if email notification is working using SMTP. # DNS domain name to set to iDRAC # Required field dns_domain_name: "" # IPV4 static DNS1 and DNS2 # Required field ipv4_static_dns1: "" ipv4_static_dns2: "" # Server IP used for SMTP # Required field smtp_server_ip: "" # Email address used for enabling 2FA # Required field use_email_address_2fa: "" # SMTP authentication disabled by default # If enabled, provide smtp username and password # Required field smtp_authentication: "disabled" # Username used for SMTP smtp_username: "" # Password used for SMTP smtp_password: "" ### Usage: idrac_ldap ### # Specify LDAP related paramters when ldap_directory_services is enabled in idrac_vars.yml # By default LDAP directory services will be "disabled" # If required it can be "enabled" in idrac_vars.yml # The LDAP server details should be valid. # CA certification validation value # cert_validation_enable supports only disabled # CA Certificate can't be uploaded using the playbook idrac_ldap.yml. # If required user has to manually upload CA certificate after idrac_ldap.yml execution. cert_validation_enable: "disabled" # Sever address used for LDAP # Required field # It's recommended to provide the LDAP server ip address instead of FQDN ldap_server_address: "" # TCP port port at which the LDAP server is listening for connections # Default port for LDAP: 389 # Default port for LDAP over SSL: 636 ldap_port: "636" # Distinguished Name of the node in your directory tree from which to start searching for records # For example: cn=Administrator,cn=Users,dc=mycompany,dc=com bind_dn: "" # Password used for bind_dn bind_password: "" # The distinguished name of the search base. # For example: dc=mycompany,dc=com # Required field base_dn: "" # User attribute used for search in LDAP server user_attribute: "" # Group attribute used for search in LDAP server group_attribute: "" # Specify whether the group attribute type is DN or not # Accepted Values: "enabled" or "disabled" # Default value: disabled group_attribute_is_dn: "disabled" # Search scope is related to the Base DN. # The search scope defines how LDAP will search for your objects. search_filter: "" # DN of LDAP group be to added # Supports adding only one role group # For example: cn=Admins,cn=Group,dc=mycompany,dc=com # Required field role_group1_dn: "" # Privielege to LDAP role group 1 # Supported values: "Administrator", "Operator", "ReadOnly" # Default value: role_group1_privilege will be "Administrator" # Required field role_group1_privilege: "Administrator"