Server IP : 85.214.239.14 / Your IP : 18.118.184.232 Web Server : Apache/2.4.62 (Debian) System : Linux h2886529.stratoserver.net 4.9.0 #1 SMP Mon Sep 30 15:36:27 MSK 2024 x86_64 User : www-data ( 33) PHP Version : 7.4.18 Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,pcntl_unshare, MySQL : OFF | cURL : OFF | WGET : ON | Perl : ON | Python : ON | Sudo : ON | Pkexec : OFF Directory : /lib/python3/dist-packages/ansible_collections/cisco/ise/plugins/modules/ |
Upload File : |
#!/usr/bin/python # -*- coding: utf-8 -*- # Copyright (c) 2021, Cisco Systems # GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) DOCUMENTATION = r""" --- module: bind_signed_certificate short_description: Resource module for Bind Signed Certificate description: - Manage operation create of the resource Bind Signed Certificate. - Bind CA Signed Certificate. version_added: '1.0.0' extends_documentation_fragment: - cisco.ise.module author: Rafael Campos (@racampos) options: admin: description: Use certificate to authenticate the Cisco ISE Admin Portal. type: bool allowExtendedValidity: description: Allow import of certificates with validity greater than 398 days (required). type: bool allowOutOfDateCert: description: Allow out of date certificates (required). type: bool allowReplacementOfCertificates: description: Allow Replacement of certificates (required). type: bool allowReplacementOfPortalGroupTag: description: Allow Replacement of Portal Group Tag (required). type: bool data: description: Signed certificate data (required). type: str eap: description: Use certificate for EAP protocols that use SSL/TLS tunneling. type: bool hostName: description: Name of Host whose CSR ID has been provided (required). type: str id: description: ID of the generated CSR (required). type: str ims: description: Use certificate for the Cisco ISE Messaging Service. type: bool name: description: Friendly Name of the certificate. type: str portal: description: Use for portal. type: bool portalGroupTag: description: Set Group tag. type: str pxgrid: description: Use certificate for the pxGrid Controller. type: bool radius: description: Use certificate for the RADSec server. type: bool saml: description: Use certificate for SAML Signing. type: bool validateCertificateExtensions: description: Validate Certificate Extensions. type: bool requirements: - ciscoisesdk >= 2.0.8 - python >= 3.5 seealso: - name: Cisco ISE documentation for Certificates description: Complete reference of the Certificates API. link: https://developer.cisco.com/docs/identity-services-engine/v1/#!certificate-openapi notes: - SDK Method used are certificates.Certificates.bind_csr, - Paths used are post /api/v1/certs/signed-certificate/bind, """ EXAMPLES = r""" - name: Create cisco.ise.bind_signed_certificate: ise_hostname: "{{ise_hostname}}" ise_username: "{{ise_username}}" ise_password: "{{ise_password}}" ise_verify: "{{ise_verify}}" admin: true allowExtendedValidity: true allowOutOfDateCert: true allowReplacementOfCertificates: true allowReplacementOfPortalGroupTag: true data: string eap: true hostName: string id: string ims: true name: string portal: true portalGroupTag: string pxgrid: true radius: true saml: true validateCertificateExtensions: true """ RETURN = r""" ise_response: description: A dictionary or list with the response returned by the Cisco ISE Python SDK returned: always type: dict sample: > { "response": { "message": "string", "status": "string" }, "version": "string" } """