blob: f2a6c651238a405b28e5b7376d5f48f461278473 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
|
ancestor: null
releases:
1.0.0:
changes:
release_summary: This is the first release of the ``microsoft.ad`` Ansible collection
which contains modules that can be used to managed a Microsoft Active Directory
environment.
fragments:
- release-summary.yml
release_date: '2023-02-15'
1.1.0:
changes:
bugfixes:
- microsoft.ad.user - Fix setting ``password_expired`` when creating a new user
- https://github.com/ansible-collections/microsoft.ad/issues/25
release_summary: 'This release includes the new ``microsoft.ad.ldap`` inventory
plugin which can be used to generate an Ansible
inventory from an LDAP/AD source.
'
fragments:
- release-1.1.0.yml
- user-password-expired.yml
modules:
- description: Get host information for debugging LDAP connections
name: debug_ldap_client
namespace: ''
plugins:
filter:
- description: Converts an LDAP value to a datetime string
name: as_datetime
namespace: null
- description: Converts an LDAP value to a GUID string
name: as_guid
namespace: null
- description: Converts an LDAP value to a Security Identifier string
name: as_sid
namespace: null
inventory:
- description: Inventory plugin for Active Directory
name: ldap
namespace: null
release_date: '2023-05-02'
1.2.0:
changes:
bugfixes:
- 'group - Fix idempotency check when ``scope: domainlocal`` is set - https://github.com/ansible-collections/microsoft.ad/issues/31'
- microsoft.ad.group - ensure the ``scope`` and ``category`` values are checked
as case insensitive to avoid changes when not needed - https://github.com/ansible-collections/microsoft.ad/issues/31
deprecated_features:
- Deprecating support for Server 2012 and Server 2012 R2. These OS versions
are reaching End of Life status from Microsoft and support for using them
in Ansible are nearing its end.
minor_changes:
- microsoft.ad.debug_ldap_client - Add ``dpapi_ng`` to list of packages checked
- microsoft.ad.ldap - Add support for decrypting LAPS encrypted password
- microsoft.ad.ldap - Allow setting LDAP connection and authentication options
through environment variables - https://github.com/ansible-collections/microsoft.ad/issues/34
release_summary: Release summary for v1.2.0
fragments:
- group-case-sensitivity-check.yml
- group-domainlocal-scopeinfo.yml
- ldap-env-var.yml
- ldap-laps-decryption.yml
- release_summary.yml
- server2012.yml
release_date: '2023-06-14'
1.3.0:
changes:
bugfixes:
- Added the missing dependency ``dpapi-ng`` to Ansible Execution Environments
requirements file for LAPS decryption support
- Ensure renaming and moving an object will be done with the ``domain_server``
and ``domain_username`` credentials specified - https://github.com/ansible-collections/microsoft.ad/issues/54
- Fix up ``protect_from_deletion`` when creating new AD objects - https://github.com/ansible-collections/microsoft.ad/issues/47
- Fix up date_time attribute comparisons to be idempotent - https://github.com/ansible-collections/microsoft.ad/issues/57
- microsoft.ad.user - Ensure the ``spn`` diff after key is ``spn`` and not ``kerberos_encryption_types``
- microsoft.ad.user - treat an expired account as a password that needs to be
changed
minor_changes:
- AD objects will no longer be moved to the default AD path for their type if
no ``path`` was specified. Use the value ``microsoft.ad.default_path`` to
explicitly set the path to the default path if that behaviour is desired.
- microsoft.ad.ldap - Added the option ``filter_without_computer`` to not add
the AND clause ``objectClass=computer`` to the final filter used - https://github.com/ansible-collections/microsoft.ad/issues/55
release_summary: release summary for v1.3.0
fragments:
- datetime-attributes.yml
- default-path.yml
- dpapi-req.yml
- ldap-filter-raw.yml
- move-adparams.yml
- protect-from-deletion.yml
- release-summary.yml
- user-account-expired-password.yml
- user-spn-diff.yml
release_date: '2023-08-11'
1.4.0:
changes:
minor_changes:
- Make ``name`` an optional parameter for the AD modules. Either ``name`` or
``identity`` needs to be set with their respective behaviours. If creating
a new AD user and only ``identity`` is set, that will be the value used for
the name of the object.
- Set minimum supported Ansible version to 2.14 to align with the versions still
supported by Ansible.
- object_info - Add ActiveDirectory module import
release_summary: Prepare for v1.4.0 release
fragments:
- 73-import-activedirectory-module.yml
- ansible_support.yml
- release_summary.yml
- search-by-identity.yml
release_date: '2023-11-16'
1.4.1:
changes:
bugfixes:
- debug_ldap_client - handle failures when attempting to get the krb5 context
and default CCache rather than fail with a traceback
release_summary: Release summary for v1.4.1
fragments:
- debug_ldap_client-failure.yml
- release_summary.yml
release_date: '2023-11-23'
1.5.0:
changes:
bugfixes:
- microsoft.ad.group - Support membership lookup of groups that are longer than
20 characters long
- microsoft.ad.membership - Add helpful hint when the failure was due to a missing/invalid
``domain_ou_path`` - https://github.com/ansible-collections/microsoft.ad/issues/88
minor_changes:
- Added ``group/microsoft.ad.domain`` module defaults group for the ``computer``,
``group``, ``object_info``, ``object``, ``ou``, and ``user`` module. Users
can use this defaults group to set common connection options for these modules
such as the ``domain_server``, ``domain_username``, and ``domain_password``
options.
- Added support for Jinja2 templating in ldap inventory.
release_summary: Release summary for v1.5.0
fragments:
- default_options.yml
- group-support-long-group-names.yml
- membership-invalid-ou.yml
- release-summary.yml
- templating_support.yml
plugins:
filter:
- description: Escape an LDAP DistinguishedName value string.
name: dn_escape
namespace: null
- description: Parses an LDAP DistinguishedName string into an object.
name: parse_dn
namespace: null
release_date: '2024-03-20'
1.6.0:
changes:
bugfixes:
- microsoft.ad.membership - Fix hostname check to work with hostnames longer
than 15 characters long - https://github.com/ansible-collections/microsoft.ad/issues/113
- 'microsoft.ad.user - Fix issue when creating a new user account with ``account_locked:
false`` - https://github.com/ansible-collections/microsoft.ad/issues/108'
minor_changes:
- microsoft.ad AD modules - Added ``domain_credentials`` as a common module
option that can be used to specify credentials for specific AD servers.
- microsoft.ad AD modules - Added ``lookup_failure_action`` on all modules that
can specify a list of distinguishedName values to control what should happen
if the lookup fails.
- microsoft.ad.computer - Added the ability to lookup a distinguishedName on
a specific domain server for ``delegates`` and ``managed_by``.
- microsoft.ad.group - Added the ability to lookup a distinguishedName on a
specific domain server for ``managed_by`` and ``members``.
- microsoft.ad.ou - Added the ability to lookup a distinguishedName on a specific
domain server for ``managed_by``.
- microsoft.ad.user - Added the ability to lookup a distinguishedName on a specific
domain server for ``delegates``.
- microsoft.ad.user - Rename the option ``groups.missing_action`` to ``groups.lookup_failure_action``
to make the option more consistent with other modules. The ``missing_action``
option is still supported as an alias.
- microsoft.ad.user - Support group member lookup on alternative server using
the DN lookup syntax. This syntax uses a dictionary where ``name`` defined
the group to lookup and ``server`` defines the server to lookup the group
on.
release_summary: Release summary for v1.6.0
fragments:
- lookup-dn.yml
- membership-long-name.yml
- release-1.6.0.yml
- user-account-locked.yml
- user-groups.yml
release_date: '2024-06-10'
|