Note
This plugin is part of the fortinet.fortios collection.
To install it use: ansible-galaxy collection install fortinet.fortios
.
To use it in a playbook, specify: fortinet.fortios.fortios_certificate_crl
.
New in version 2.9: of fortinet.fortios
The below requirements are needed on the host that executes this module.
Parameter | Choices/Defaults | Comments | |
---|---|---|---|
certificate_crl dictionary | Certificate Revocation List as a PEM file. | ||
crl string | Certificate Revocation List as a PEM file. | ||
http_url string | HTTP server URL for CRL auto-update. | ||
last_updated integer | Time at which CRL was last updated. | ||
ldap_password string | LDAP server user password. | ||
ldap_server string | LDAP server name for CRL auto-update. | ||
ldap_username string | LDAP server user name. | ||
name string / required | Name. | ||
range string |
| Either global or VDOM IP address range for the certificate. | |
scep_cert string | Local certificate for SCEP communication for CRL auto-update. Source certificate.local.name. | ||
scep_url string | SCEP server URL for CRL auto-update. | ||
source string |
| Certificate source type. | |
source_ip string | Source IP address for communications to a HTTP or SCEP CA server. | ||
update_interval integer | Time in seconds before the FortiGate checks for an updated CRL. Set to 0 to update only when it expires. | ||
update_vdom string | VDOM for CRL update. Source system.vdom.name. | ||
host string | FortiOS or FortiGate IP address. | ||
https boolean |
| Indicates if the requests towards FortiGate must use HTTPS protocol. | |
password string | Default: "" | FortiOS or FortiGate password. | |
ssl_verify boolean |
| Ensures FortiGate certificate must be verified by a proper CA. | |
state string / required |
| Indicates whether to create or remove the object. | |
username string | FortiOS or FortiGate username. | ||
vdom string | Default: "root" | Virtual domain, among those defined previously. A vdom is a virtual instance of the FortiGate that can be configured and used as a different unit. |
Note
- hosts: fortigates collections: - fortinet.fortios connection: httpapi vars: vdom: "root" ansible_httpapi_use_ssl: yes ansible_httpapi_validate_certs: no ansible_httpapi_port: 443 tasks: - name: Certificate Revocation List as a PEM file. fortios_certificate_crl: vdom: "{{ vdom }}" state: "present" certificate_crl: crl: "<your_own_value>" http_url: "<your_own_value>" last_updated: "5" ldap_password: "<your_own_value>" ldap_server: "<your_own_value>" ldap_username: "<your_own_value>" name: "default_name_9" range: "global" scep_cert: "<your_own_value> (source certificate.local.name)" scep_url: "<your_own_value>" source: "factory" source_ip: "84.230.14.43" update_interval: "15" update_vdom: "<your_own_value> (source system.vdom.name)"
Common return values are documented here, the following are the fields unique to this module:
Key | Returned | Description |
---|---|---|
build string | always | Build number of the fortigate image Sample: 1547 |
http_method string | always | Last method used to provision the content into FortiGate Sample: PUT |
http_status string | always | Last result given by FortiGate on last operation applied Sample: 200 |
mkey string | success | Master key (id) used in the last call to FortiGate Sample: id |
name string | always | Name of the table used to fulfill the request Sample: urlfilter |
path string | always | Path of the table used to fulfill the request Sample: webfilter |
revision string | always | Internal revision number Sample: 17.0.2.10658 |
serial string | always | Serial number of the unit Sample: FGVMEVYYQT3AB5352 |
status string | always | Indication of the operation's result Sample: success |
vdom string | always | Virtual domain used Sample: root |
version string | always | Version of the FortiGate Sample: v5.6.3 |
© 2012–2018 Michael DeHaan
© 2018–2019 Red Hat, Inc.
Licensed under the GNU General Public License version 3.
https://docs.ansible.com/ansible/2.10/collections/fortinet/fortios/fortios_certificate_crl_module.html