summaryrefslogtreecommitdiffstats
path: root/collections-debian-merged/ansible_collections/cyberark/pas/README.md
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-05-14 20:03:01 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-05-14 20:03:01 +0000
commita453ac31f3428614cceb99027f8efbdb9258a40b (patch)
treef61f87408f32a8511cbd91799f9cececb53e0374 /collections-debian-merged/ansible_collections/cyberark/pas/README.md
parentInitial commit. (diff)
downloadansible-a453ac31f3428614cceb99027f8efbdb9258a40b.tar.xz
ansible-a453ac31f3428614cceb99027f8efbdb9258a40b.zip
Adding upstream version 2.10.7+merged+base+2.10.8+dfsg.upstream/2.10.7+merged+base+2.10.8+dfsgupstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'collections-debian-merged/ansible_collections/cyberark/pas/README.md')
-rw-r--r--collections-debian-merged/ansible_collections/cyberark/pas/README.md60
1 files changed, 60 insertions, 0 deletions
diff --git a/collections-debian-merged/ansible_collections/cyberark/pas/README.md b/collections-debian-merged/ansible_collections/cyberark/pas/README.md
new file mode 100644
index 00000000..58d3ad13
--- /dev/null
+++ b/collections-debian-merged/ansible_collections/cyberark/pas/README.md
@@ -0,0 +1,60 @@
+<!-- please note this has to be a absolute URL since otherwise it will not show up on galaxy.ansible.com -->
+![cyberark logo|](https://github.com/cyberark/ansible-security-automation-collection/blob/master/docs/images/full-cyberark-logo.jpg?raw=true)
+
+## CyberArk Ansible Security Automation Collection
+
+*************
+
+## Collection
+
+#### cyberark.pas
+
+
+This collection is the CyberArk Ansible Security Automation project. This is aimed to enable the automation of securing privileged access by storing privileged accounts in the Enterprise Password Vault (EPV), controlling user's access to privileged accounts in EPV, and securely retreiving secrets using Application Access Manager (AAM). The following modules will allow CyberArk administrators to automate the following tasks:
+
+#### Requirements
+
+- CyberArk Privileged Account Security Web Services SDK
+- CyberArk AAM Central Credential Provider (**Only required for cyberark_credential**)
+
+#### Role Variables
+
+None.
+<br>
+<br>
+
+## Modules
+
+#### cyberark_authentication
+
+- Using the CyberArk Web Services SDK, authenticate and obtain an auth token to be passed as a variable in playbooks
+- Logoff of an authenticated REST API session<br>
+[Playbooks and Module Info](https://github.com/cyberark/ansible-security-automation-collection/blob/master/docs/cyberark_authentication.md)
+
+#### cyberark_user
+
+- Add a CyberArk User
+- Delete a CyberArk User
+- Update a CyberArk User's account parameters
+ - Enable/Disable, change password, mark for change at next login, etc
+<br>[Playbooks and Module Info](https://github.com/cyberark/ansible-security-automation-collection/blob/master/docs/cyberark_user.md)<br/>
+
+#### cyberark_account
+
+- Add Privileged Account to the EPV
+- Delete account objects
+- Modify account properties
+- Rotatate privileged credentials<br>
+[Playbooks and Module Info](https://github.com/cyberark/ansible-security-automation-collection/blob/master/docs/cyberark_account.md)
+
+#### cyberark_credential
+
+- Using AAM Central Credential Provider (CCP), to securely retreive secrets and account properties from EPV to be registered for use in playbooks<br>
+[Playbooks and Module Info](https://github.com/cyberark/ansible-security-automation-collection/blob/master/docs/cyberark_credential.md)
+
+#### Author Information
+- CyberArk Business Development Technical Team
+ - @enunez-cyberark
+ - @cyberark-bizdev
+ - @jimmyjamcabd
+