New in version 2.8.
The below requirements are needed on the host that executes this module.
| Parameter | Choices/Defaults | Comments | ||||
|---|---|---|---|---|---|---|
| host string | FortiOS or FortiGate IP address. | |||||
| https boolean |
| Indicates if the requests towards FortiGate must use HTTPS protocol. | ||||
| password string | Default: "" | FortiOS or FortiGate password. | ||||
| ssl_verify boolean added in 2.9 |
| Ensures FortiGate certificate must be verified by a proper CA. | ||||
| state string added in 2.9 |
| Indicates whether to create or remove the object. This attribute was present already in previous version in a deeper level. It has been moved out to this outer level. | ||||
| system_admin dictionary | Default: null | Configure admin users. | ||||
| accprofile string | Access profile for this administrator. Access profiles control administrator access to FortiGate features. Source system.accprofile.name. | |||||
| accprofile_override string |
| Enable to use the name of an access profile provided by the remote authentication server to control the FortiGate features that this administrator can access. | ||||
| allow_remove_admin_session string |
| Enable/disable allow admin session to be removed by privileged admin users. | ||||
| comments string | Comment. | |||||
| email_to string | This administrator's email address. | |||||
| force_password_change string |
| Enable/disable force password change on next login. | ||||
| fortitoken string | This administrator's FortiToken serial number. | |||||
| guest_auth string |
| Enable/disable guest authentication. | ||||
| guest_lang string | Guest management portal language. Source system.custom-language.name. | |||||
| guest_usergroups list | Select guest user groups. | |||||
| name string / required | Select guest user groups. | |||||
| gui_dashboard list | GUI dashboards. | |||||
| columns integer | Number of columns. | |||||
| id integer / required | Dashboard ID. | |||||
| layout_type string |
| Layout type. | ||||
| name string | Dashboard name. | |||||
| scope string |
| Dashboard scope. | ||||
| widget list | Dashboard widgets. | |||||
| fabric_device string | Fabric device to monitor. | |||||
| fortiview_filters list | FortiView filters. | |||||
| id integer / required | FortiView Filter ID. | |||||
| key string | Filter key. | |||||
| value string | Filter value. | |||||
| fortiview_sort_by string | FortiView sort by. | |||||
| fortiview_timeframe string | FortiView timeframe. | |||||
| fortiview_type string | FortiView type. | |||||
| fortiview_visualization string | FortiView visualization. | |||||
| height integer | Height. | |||||
| id integer / required | Widget ID. | |||||
| industry string |
| Security Audit Rating industry. | ||||
| interface string | Interface to monitor. Source system.interface.name. | |||||
| region string |
| Security Audit Rating region. | ||||
| title string | Widget title. | |||||
| type string |
| Widget type. | ||||
| width integer | Width. | |||||
| x_pos integer | X position. | |||||
| y_pos integer | Y position. | |||||
| gui_global_menu_favorites list | Favorite GUI menu IDs for the global VDOM. | |||||
| id string / required | Select menu ID. | |||||
| gui_vdom_menu_favorites list | Favorite GUI menu IDs for VDOMs. | |||||
| id string / required | Select menu ID. | |||||
| hidden integer | Admin user hidden attribute. | |||||
| history0 string | history0 | |||||
| history1 string | history1 | |||||
| ip6_trusthost1 string | Any IPv6 address from which the administrator can connect to the FortiGate unit. Default allows access from any IPv6 address. | |||||
| ip6_trusthost10 string | Any IPv6 address from which the administrator can connect to the FortiGate unit. Default allows access from any IPv6 address. | |||||
| ip6_trusthost2 string | Any IPv6 address from which the administrator can connect to the FortiGate unit. Default allows access from any IPv6 address. | |||||
| ip6_trusthost3 string | Any IPv6 address from which the administrator can connect to the FortiGate unit. Default allows access from any IPv6 address. | |||||
| ip6_trusthost4 string | Any IPv6 address from which the administrator can connect to the FortiGate unit. Default allows access from any IPv6 address. | |||||
| ip6_trusthost5 string | Any IPv6 address from which the administrator can connect to the FortiGate unit. Default allows access from any IPv6 address. | |||||
| ip6_trusthost6 string | Any IPv6 address from which the administrator can connect to the FortiGate unit. Default allows access from any IPv6 address. | |||||
| ip6_trusthost7 string | Any IPv6 address from which the administrator can connect to the FortiGate unit. Default allows access from any IPv6 address. | |||||
| ip6_trusthost8 string | Any IPv6 address from which the administrator can connect to the FortiGate unit. Default allows access from any IPv6 address. | |||||
| ip6_trusthost9 string | Any IPv6 address from which the administrator can connect to the FortiGate unit. Default allows access from any IPv6 address. | |||||
| login_time list | Record user login time. | |||||
| last_failed_login string | Last failed login time. | |||||
| last_login string | Last successful login time. | |||||
| usr_name string | User name. | |||||
| name string / required | User name. | |||||
| password string | Admin user password. | |||||
| password_expire string | Password expire time. | |||||
| peer_auth string |
| Set to enable peer certificate authentication (for HTTPS admin access). | ||||
| peer_group string | Name of peer group defined under config user group which has PKI members. Used for peer certificate authentication (for HTTPS admin access). | |||||
| radius_vdom_override string |
| Enable to use the names of VDOMs provided by the remote authentication server to control the VDOMs that this administrator can access. | ||||
| remote_auth string |
| Enable/disable authentication using a remote RADIUS, LDAP, or TACACS+ server. | ||||
| remote_group string | User group name used for remote auth. | |||||
| schedule string | Firewall schedule used to restrict when the administrator can log in. No schedule means no restrictions. | |||||
| sms_custom_server string | Custom SMS server to send SMS messages to. Source system.sms-server.name. | |||||
| sms_phone string | Phone number on which the administrator receives SMS messages. | |||||
| sms_server string |
| Send SMS messages using the FortiGuard SMS server or a custom server. | ||||
| ssh_certificate string | Select the certificate to be used by the FortiGate for authentication with an SSH client. Source certificate.local.name. | |||||
| ssh_public_key1 string | Public key of an SSH client. The client is authenticated without being asked for credentials. Create the public-private key pair in the SSH client application. | |||||
| ssh_public_key2 string | Public key of an SSH client. The client is authenticated without being asked for credentials. Create the public-private key pair in the SSH client application. | |||||
| ssh_public_key3 string | Public key of an SSH client. The client is authenticated without being asked for credentials. Create the public-private key pair in the SSH client application. | |||||
| state string |
| Deprecated Starting with Ansible 2.9 we recommend using the top-level 'state' parameter. Indicates whether to create or remove the object. | ||||
| trusthost1 string | Any IPv4 address or subnet address and netmask from which the administrator can connect to the FortiGate unit. Default allows access from any IPv4 address. | |||||
| trusthost10 string | Any IPv4 address or subnet address and netmask from which the administrator can connect to the FortiGate unit. Default allows access from any IPv4 address. | |||||
| trusthost2 string | Any IPv4 address or subnet address and netmask from which the administrator can connect to the FortiGate unit. Default allows access from any IPv4 address. | |||||
| trusthost3 string | Any IPv4 address or subnet address and netmask from which the administrator can connect to the FortiGate unit. Default allows access from any IPv4 address. | |||||
| trusthost4 string | Any IPv4 address or subnet address and netmask from which the administrator can connect to the FortiGate unit. Default allows access from any IPv4 address. | |||||
| trusthost5 string | Any IPv4 address or subnet address and netmask from which the administrator can connect to the FortiGate unit. Default allows access from any IPv4 address. | |||||
| trusthost6 string | Any IPv4 address or subnet address and netmask from which the administrator can connect to the FortiGate unit. Default allows access from any IPv4 address. | |||||
| trusthost7 string | Any IPv4 address or subnet address and netmask from which the administrator can connect to the FortiGate unit. Default allows access from any IPv4 address. | |||||
| trusthost8 string | Any IPv4 address or subnet address and netmask from which the administrator can connect to the FortiGate unit. Default allows access from any IPv4 address. | |||||
| trusthost9 string | Any IPv4 address or subnet address and netmask from which the administrator can connect to the FortiGate unit. Default allows access from any IPv4 address. | |||||
| two_factor string |
| Enable/disable two-factor authentication. | ||||
| vdom list | Virtual domain(s) that the administrator can access. | |||||
| name string / required | Virtual domain name. Source system.vdom.name. | |||||
| wildcard string |
| Enable/disable wildcard RADIUS authentication. | ||||
| username string | FortiOS or FortiGate username. | |||||
| vdom string | Default: "root" | Virtual domain, among those defined previously. A vdom is a virtual instance of the FortiGate that can be configured and used as a different unit. | ||||
Note
- hosts: localhost
vars:
host: "192.168.122.40"
username: "admin"
password: ""
vdom: "root"
ssl_verify: "False"
tasks:
- name: Configure admin users.
fortios_system_admin:
host: "{{ host }}"
username: "{{ username }}"
password: "{{ password }}"
vdom: "{{ vdom }}"
https: "False"
state: "present"
system_admin:
accprofile: "<your_own_value> (source system.accprofile.name)"
accprofile_override: "enable"
allow_remove_admin_session: "enable"
comments: "<your_own_value>"
email_to: "<your_own_value>"
force_password_change: "enable"
fortitoken: "<your_own_value>"
guest_auth: "disable"
guest_lang: "<your_own_value> (source system.custom-language.name)"
guest_usergroups:
-
name: "default_name_13"
gui_dashboard:
-
columns: "15"
id: "16"
layout_type: "responsive"
name: "default_name_18"
scope: "global"
widget:
-
fabric_device: "<your_own_value>"
fortiview_filters:
-
id: "23"
key: "<your_own_value>"
value: "<your_own_value>"
fortiview_sort_by: "<your_own_value>"
fortiview_timeframe: "<your_own_value>"
fortiview_type: "<your_own_value>"
fortiview_visualization: "<your_own_value>"
height: "30"
id: "31"
industry: "default"
interface: "<your_own_value> (source system.interface.name)"
region: "default"
title: "<your_own_value>"
type: "sysinfo"
width: "37"
x_pos: "38"
y_pos: "39"
gui_global_menu_favorites:
-
id: "41"
gui_vdom_menu_favorites:
-
id: "43"
hidden: "44"
history0: "<your_own_value>"
history1: "<your_own_value>"
ip6_trusthost1: "<your_own_value>"
ip6_trusthost10: "<your_own_value>"
ip6_trusthost2: "<your_own_value>"
ip6_trusthost3: "<your_own_value>"
ip6_trusthost4: "<your_own_value>"
ip6_trusthost5: "<your_own_value>"
ip6_trusthost6: "<your_own_value>"
ip6_trusthost7: "<your_own_value>"
ip6_trusthost8: "<your_own_value>"
ip6_trusthost9: "<your_own_value>"
login_time:
-
last_failed_login: "<your_own_value>"
last_login: "<your_own_value>"
usr_name: "<your_own_value>"
name: "default_name_61"
password: "<your_own_value>"
password_expire: "<your_own_value>"
peer_auth: "enable"
peer_group: "<your_own_value>"
radius_vdom_override: "enable"
remote_auth: "enable"
remote_group: "<your_own_value>"
schedule: "<your_own_value>"
sms_custom_server: "<your_own_value> (source system.sms-server.name)"
sms_phone: "<your_own_value>"
sms_server: "fortiguard"
ssh_certificate: "<your_own_value> (source certificate.local.name)"
ssh_public_key1: "<your_own_value>"
ssh_public_key2: "<your_own_value>"
ssh_public_key3: "<your_own_value>"
trusthost1: "<your_own_value>"
trusthost10: "<your_own_value>"
trusthost2: "<your_own_value>"
trusthost3: "<your_own_value>"
trusthost4: "<your_own_value>"
trusthost5: "<your_own_value>"
trusthost6: "<your_own_value>"
trusthost7: "<your_own_value>"
trusthost8: "<your_own_value>"
trusthost9: "<your_own_value>"
two_factor: "disable"
vdom:
-
name: "default_name_89 (source system.vdom.name)"
wildcard: "enable"
Common return values are documented here, the following are the fields unique to this module:
| Key | Returned | Description |
|---|---|---|
| build string | always | Build number of the fortigate image Sample: 1547 |
| http_method string | always | Last method used to provision the content into FortiGate Sample: PUT |
| http_status string | always | Last result given by FortiGate on last operation applied Sample: 200 |
| mkey string | success | Master key (id) used in the last call to FortiGate Sample: id |
| name string | always | Name of the table used to fulfill the request Sample: urlfilter |
| path string | always | Path of the table used to fulfill the request Sample: webfilter |
| revision string | always | Internal revision number Sample: 17.0.2.10658 |
| serial string | always | Serial number of the unit Sample: FGVMEVYYQT3AB5352 |
| status string | always | Indication of the operation's result Sample: success |
| vdom string | always | Virtual domain used Sample: root |
| version string | always | Version of the FortiGate Sample: v5.6.3 |
Hint
If you notice any issues in this documentation, you can edit this document to improve it.
© 2012–2018 Michael DeHaan
© 2018–2019 Red Hat, Inc.
Licensed under the GNU General Public License version 3.
https://docs.ansible.com/ansible/2.9/modules/fortios_system_admin_module.html