aci_aaa_user_certificate – Manage AAA user certificates (aaa:UserCert)¶
New in version 2.5.
Parameters¶
Notes¶
Note
- The
aaa_user
must exist before using this module in your playbook. The aci_aaa_user module can be used for this.
See Also¶
See also
- aci_aaa_user – Manage AAA users (aaa:User)
- The official documentation on the aci_aaa_user module.
- APIC Management Information Model reference
- More information about the internal APIC class aaa:UserCert.
- Cisco ACI Guide
- Detailed information on how to manage your ACI infrastructure using Ansible.
- Developing Cisco ACI modules
- Detailed guide on how to write your own Cisco ACI modules to contribute.
Examples¶
- name: Add a certificate to user
aci_aaa_user_certificate:
host: apic
username: admin
password: SomeSecretPassword
aaa_user: admin
certificate_name: admin
certificate_data: '{{ lookup("file", "pki/admin.crt") }}'
state: present
delegate_to: localhost
- name: Remove a certificate of a user
aci_aaa_user_certificate:
host: apic
username: admin
password: SomeSecretPassword
aaa_user: admin
certificate_name: admin
state: absent
delegate_to: localhost
- name: Query a certificate of a user
aci_aaa_user_certificate:
host: apic
username: admin
password: SomeSecretPassword
aaa_user: admin
certificate_name: admin
state: query
delegate_to: localhost
register: query_result
- name: Query all certificates of a user
aci_aaa_user_certificate:
host: apic
username: admin
password: SomeSecretPassword
aaa_user: admin
state: query
delegate_to: localhost
register: query_result
Return Values¶
Common return values are documented here, the following are the fields unique to this module:
Status¶
- This module is not guaranteed to have a backwards compatible interface. [preview]
- This module is maintained by an Ansible Partner. [certified]
Authors¶
- Dag Wieers (@dagwieers)
Hint
If you notice any issues in this documentation, you can edit this document to improve it.