Skip to content

Define 'mfa' model for the Dell Enterprise SONiC collection #293

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 7 commits into
base: master
Choose a base branch
from

Conversation

Divya-N3
Copy link

Initial posting of model definition for MFA (Multi-Factor Authentication)

description:
- Indicates whether the seed is plain text or encrypted
type: bool
mfa_security_profile:
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Since its a suboption of MFA, the prefix is not required.

Suggested change
mfa_security_profile:
security_profile:

- RSA Global configuration
type: dict
suboptions:
rsa_security_profile:
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Same as MFA.

Suggested change
rsa_security_profile:
security_profile:

- CAC-PIV Global configuration
type: dict
suboptions:
cacpiv_security_profile:
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Same as MFA.

Suggested change
cacpiv_security_profile:
security_profile:

Comment on lines 112 to 119
cert_username_field:
description:
- SSH user certificate field for matching with SSH login username
type: str
cert_username_match:
description:
- Match option to parse the username from respective certificate field
type: str
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Since only a set of pre-defined string values are supported for these options, those values can be listed as 'choices'.

suboptions:
key_seed:
description:
- Encrypted seed for generating secure key in MFA service
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
- Encrypted seed for generating secure key in MFA service
- Seed for generating secure key in MFA service
- Plain text seed i.e. I(key_seed_encrypted=false) will be stored in encrypted format in running-config, so idempotency will
not be maintained and hence the task output will always be I(changed=true).

type: str
client_secret:
description:
- Encrypted password used in basic authorization header for MFA REST API
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
- Encrypted password used in basic authorization header for MFA REST API
- Password used in basic authorization header for MFA REST API
- Plain text password i.e. I(client_secret_encrypted=false) will be stored in encrypted format in running-config, so idempotency will
not be maintained and hence the task output will always be I(changed=true).

type: str
client_secret_encrypted:
description:
- Indicates whether the client-secret is plain text or encrypted
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
- Indicates whether the client-secret is plain text or encrypted
- Indicates whether I(client_secret) is plain text or encrypted

type: str
client_key:
description:
- Encrypted Key associated with the client-id, assigned by SecurID service
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
- Encrypted Key associated with the client-id, assigned by SecurID service
- Key associated with the client-id, assigned by SecurID service
- Plain text key i.e. I(client_key_encrypted=false) will be stored in encrypted format in running-config, so idempotency will
not be maintained and hence the task output will always be I(changed=true).

type: str
client_key_encrypted:
description:
- Indicates whether the client-key is plain text or encrypted
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
- Indicates whether the client-key is plain text or encrypted
- Indicates whether I(client_key) is plain text or encrypted

config:
cac_piv_global:
cert_username_match: 'first-name'
state: overriden
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
state: overriden
state: overridden

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants