You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: downstream/assemblies/platform/assembly-controller-credentials.adoc
+51-37Lines changed: 51 additions & 37 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,18 +2,6 @@
2
2
3
3
[id="controller-credentials"]
4
4
5
-
//ifdef::controller-GS[]
6
-
//= Managing credentials
7
-
8
-
9
-
//Credentials authenticate the controller user to launch Ansible playbooks. The passwords and SSH keys are used to authenticate against inventory hosts.
10
-
//By using the credentials feature of {ControllerName}, you can require the {ControllerName} user to enter a password or key phrase when a playbook launches.
Credentials authenticate the {ControllerName} user when launching jobs against machines, synchronizing with inventory sources, and importing project content from a version control system.
@@ -27,70 +15,96 @@ If a user moves to a different team or leaves the organization, you do not have
27
15
For further information, see link:{URLControllerAdminGuide}[_{ControllerAG}_].
28
16
====
29
17
30
-
== How credentials work
31
-
{ControllerNameStart} uses SSH to connect to remote hosts.
32
-
To pass the key from {ControllerName} to SSH, the key must be decrypted before it can be written to a named pipe.
33
-
{ControllerNameStart} uses that pipe to send the key to SSH, so that the key is never written to disk.
34
-
If passwords are used, {ControllerName} handles them by responding directly to the password prompt and decrypting the password before writing it to the prompt.
18
+
//Removed as part of editorial review - include::platform/ref-controller-credentials-getting-started.adoc[leveloffset=+1]
{ControllerNameStart} uses SSH to connect to remote hosts.
6
+
To pass the key from {ControllerName} to SSH, the key must be decrypted before it can be written to a named pipe.
7
+
{ControllerNameStart} uses that pipe to send the key to SSH, so that the key is never written to disk.
8
+
If passwords are used, {ControllerName} handles them by responding directly to the password prompt and decrypting the password before writing it to the prompt.
9
+
10
+
The *Credentials* page shows credentials that are currently available.
11
+
The default view is collapsed (Compact), showing the credential name, and credential type.
12
+
13
+
From this screen you can edit image:leftpencil.png[Edit,15,15], duplicate image:copy.png[Copy,15,15] or delete {MoreActionsIcon} a credential.
14
+
15
+
[NOTE]
16
+
====
17
+
It is possible to create duplicate credentials with the same name and without an organization.
18
+
However, it is not possible to create two duplicate credentials in the same organization.
19
+
20
+
.Example
21
+
22
+
. Create two machine credentials with the same name but without an organization.
23
+
. Use the module `ansible.controller.export` to export the credentials.
24
+
. Use the module `ansible.controller.import` in a different automation execution node.
25
+
. Check the imported credentials.
26
+
27
+
When you export two duplicate credentials and then import them in a different node, only one credential is imported.
Copy file name to clipboardExpand all lines: downstream/modules/platform/proc-controller-add-users-job-templates.adoc
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@
11
11
. Click the *User Access* tab.
12
12
You can see users and teams associated with this credential and their roles.
13
13
If no users exist, add them from the *Users* menu.
14
-
For more information, see link:{BaseURL}/red_hat_ansible_automation_platform/{PlatformVers}/html/access_management_and_authentication/gw-managing-access#assembly-controller-users_gw-manage-rbac[Users].
14
+
For more information, see link:{URLCentralAuth}/gw-managing-access#assembly-controller-users_gw-manage-rbac[Users].
15
15
. Click btn:[Add roles].
16
16
. Select the user(s) that you want to give access to the credential and click btn:[Next].
17
17
. From the *Select roles to apply* page, select the roles you want to add to the User.
@@ -27,4 +27,4 @@ If the action is not successful, a warning displays.
27
27
. Select the *Job templates* tab to select a job template to which you want to assign this credential.
28
28
. Chose a job template or select *Create job template* from the *Create template* list to assign the credential to additional job templates.
29
29
+
30
-
For more information about creating new job templates, see the xref:controller-job-templates[Job templates] section.
30
+
For more information about creating new job templates, see link:{URLControllerUserGuide}/controller-job-templates[Job templates].
Copy file name to clipboardExpand all lines: downstream/modules/platform/proc-controller-create-credential.adoc
+1-11Lines changed: 1 addition & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,21 +3,14 @@
3
3
[id="controller-create-credential"]
4
4
5
5
= Creating new credentials
6
-
//ifdef::controller-GS[]
7
-
//As part of the initial setup, a demonstration credential and a Galaxy credential have been created for your use. Use the Galaxy credential as a template.
8
-
//It can be copied, but not edited.
9
-
//You can add more credentials as necessary.
10
-
//endif::controller-GS[]
11
6
12
-
//ifdef::controller-UG[]
13
7
Credentials added to a team are made available to all members of the team.
14
8
You can also add credentials to individual users.
15
9
16
10
As part of the initial setup, two credentials are available for your use: Demo Credential and Ansible Galaxy.
17
11
Use the Ansible Galaxy credential as a template.
18
12
You can copy this credential, but not edit it.
19
13
Add more credentials as needed.
20
-
//endif::controller-UG[]
21
14
22
15
.Procedure
23
16
. From the navigation panel, select {MenuAECredentials}.
@@ -30,12 +23,9 @@ Add more credentials as needed.
30
23
* Optional *Organization*: The name of the organization with which the credential is associated. The default is *Default*.
31
24
* *Credential type*: enter or select the credential type you want to create.
32
25
33
-
. Enter the appropriate details depending on the type of credential selected, as described in xref:ref-controller-credential-types[Credential types].
26
+
. Enter the appropriate details depending on the type of credential selected, as described in link:{URLControllerUserGuide}/controller-credentials#ref-controller-credential-types[Credential types].
34
27
+
35
28
image:credential-types-drop-down-menu.png[Credential types drop down list]
36
29
37
-
38
30
. Click btn:[Create credential].
39
31
40
-
//You can also use this procedure from the *Credentials* tab when you select a credential type on the *Credential Types* page. Not sure how to document that, it should be a single route.
0 commit comments