Skip to content

Commit c2a35c1

Browse files
committed
Asciidoc conversion of hardening guide changes.
Corrections Asciidoc conversion of new and revised content for hardening guide v4. https://issues.redhat.com/browse/AAP-48749
1 parent e353044 commit c2a35c1

7 files changed

+12
-12
lines changed

downstream/assemblies/aap-hardening/assembly-hardening-aap.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -59,9 +59,9 @@ include::aap-hardening/proc-install-user-pki.adoc[leveloffset=+2]
5959

6060
include::aap-hardening/ref-sensitive-variables-install-inventory.adoc[leveloffset=+2]
6161

62-
include::aap-hardening/ref-install-rpm-deployment.adoc[leveloffset=+2]
62+
include::aap-hardening/ref-install-rpm-deployment.adoc[leveloffset=+3]
6363

64-
include::aap-hardening/ref-install-containerized-deployment.adoc[leveloffset=+2]
64+
include::aap-hardening/ref-install-containerized-deployment.adoc[leveloffset=+3]
6565

6666
//include::aap-hardening/con-controller-stig-considerations.adoc[leveloffset=+2]
6767

downstream/modules/aap-hardening/con-create-dedicated-service-account.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,15 +13,15 @@ The remainder of this section uses "ansible" as the assumed name for a local ser
1313
The local service account is configured in the following manner:
1414

1515
* It is granted sufficient privileges to run any automation job required.
16-
* It is limited to SSH key authentication only.No password authentication is allowed.
16+
* It is limited to SSH key authentication only. No password authentication is allowed.
1717
* Access is only granted to connections made from the {PlatformNameShort} {ControllerNames}s and execution nodes.
1818
+
1919
[NOTE]
2020
====
21-
To execute tasks in an Ansible playbook or job template as a user other than the service account, use the 'become' and 'become_user' keywords. Connecting to the managed node as a different user is not necessary.
21+
To execute tasks in an Ansible playbook or job template as a user other than the service account, use the `become` and `become_user` keywords. Connecting to the managed node as a different user is not necessary.
2222
====
2323

24-
* The 'useradd' command can be used to create a local service account. For example:
24+
* The `useradd` command can be used to create a local service account. For example:
2525

2626
----
2727
sudo useradd ansible \
Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
[id="con-hashicorp-vault-external-secrets"]
22

3-
= Use HashiCorp vault for external secrets management
3+
= Using HashiCorp vault for external secrets management
44

5-
Learn how to integrate HashiCorp Vault with {PlatformNameShort} to manage and retrieve sensitive data.
5+
You can integrate HashiCorp Vault with {PlatformNameShort} to manage and retrieve sensitive data.

downstream/modules/aap-hardening/con-more_compliance-profile-considerations.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,4 +3,4 @@
33
= Compliance profile considerations
44

55
In many environments, you can use {PlatformNameShort} to manage systems where security controls have been applied to managed RHEL nodes to meet the requirements of a compliance profile such as CIS, PCI/DSS, the DISA STIG, or similar.
6-
The following sections detail the specific set of security controls that must be modified for {PlatformNameShort} to manage the RHEL nodes properly in such environments,
6+
The following sections detail the specific set of security controls that must be modified for {PlatformNameShort} to manage the RHEL nodes properly in such environments.

downstream/modules/aap-hardening/proc-configure-hashicorp-vault.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ One of the most common and recommended authentication methods for the HashiCorp
77
To configure {PlatformNameShort} to use secrets stored in HashiCorp vault, set up a new credential with the type of HashiCorp Vault Secret Lookup.
88
For information on how to do this, see link:{URLControllerAdminGuide}/assembly-controller-secret-management#ref-hashicorp-vault-lookup[Hashicorp vault secret lookup].
99

10-
Enter relevant information such as an identifiable credential name, organization, and the URL of the vault server, for example, https://vault.domain.com:8200
10+
Enter relevant information such as an identifiable credential name, organization, and the URL of the vault server, for example, https://vault.domain.com:8200.
1111

1212
Populate the necessary fields with your information such as Token, AppRole role_id, and AppRole secret_id, then select v2 for the API version.
1313

@@ -19,7 +19,7 @@ To test the credential to test for functionally and operation, use the following
1919
+
2020
[NOTE]
2121
====
22-
The *Path to Secret* will be prefixed by `kv` if storing a key-value pair (e.g. `kv/key_name`).
22+
The *Path to Secret* will be prefixed by `kv` if storing a key-value pair, for example, `kv/key_name`.
2323
====
2424

2525
. Click btn:[Run].

downstream/modules/aap-hardening/proc-create-fapolicyd-rules.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44

55
Where the `fapolicyd` service must enforce its rules, consider crafting a custom set of rules to permit {PlatformNameShort} to execute its Python code.
66

7-
The following procedure treats the "ansible" service account as a trusted entity and enables it to execute content in the local Ansible temporary directory (by default, `$HOME/.ansible/tmp`)
7+
The following procedure treats the "ansible" service account as a trusted entity and enables it to execute content in the local Ansible temporary directory (by default, `$HOME/.ansible/tmp`).
88

99
.Procedure
1010
. Create the file `/etc/fapolicy/rules.d/50-ansible.rules` with the following content:

downstream/modules/aap-hardening/ref-sensitive-variables-install-inventory.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77

88
[role="_abstract"]
99

10-
The installation inventory file for {PlatformNameShort }contains a number of sensitive variables, such as default administrative and database passwords.
10+
The installation inventory file for {PlatformNameShort}contains a number of sensitive variables, such as default administrative and database passwords.
1111
By default, these are stored in plain text.
1212
To enhance security and comply with organizational policies, encrypt these variables using an Ansible vault file.
1313

0 commit comments

Comments
 (0)