On this page
fortinet.fortimanager.fmgr_system_admin_user – Admin user.
Note
This plugin is part of the fortinet.fortimanager collection (version 2.1.3).
You might already have this collection installed if you are using the ansible
package. It is not included in ansible-core
. To check whether it is installed, run ansible-galaxy collection list
.
To install it, use: ansible-galaxy collection install fortinet.fortimanager
.
To use it in a playbook, specify: fortinet.fortimanager.fmgr_system_admin_user
.
New in version 2.10: of fortinet.fortimanager
Synopsis
- This module is able to configure a FortiManager device.
- Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
Parameter | Choices/Defaults | Comments | ||
---|---|---|---|---|
bypass_validation
boolean
|
|
only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters
|
||
enable_log
boolean
|
|
Enable/Disable logging for task
|
||
proposed_method
string
|
|
The overridden method for the underlying Json RPC request
|
||
rc_failed
list / elements=string
|
the rc codes list with which the conditions to fail will be overriden
|
|||
rc_succeeded
list / elements=string
|
the rc codes list with which the conditions to succeed will be overriden
|
|||
state
string / required
|
|
the directive to create, update or delete an object
|
||
system_admin_user
dictionary
|
the top level parameters set
|
|||
adom
list / elements=string
|
no description
|
|||
adom-name
string
|
Admin domain names.
|
|||
adom-exclude
list / elements=string
|
no description
|
|||
adom-name
string
|
Admin domain names.
|
|||
app-filter
list / elements=string
|
no description
|
|||
app-filter-name
string
|
App filter name.
|
|||
avatar
string
|
Image file for avatar (maximum 4K base64 encoded).
|
|||
ca
string
|
PKI user certificate CA (CA name in local).
|
|||
change-password
string
|
|
Enable/disable restricted user to change self password.
disable - Disable setting.
enable - Enable setting.
|
||
dashboard
list / elements=string
|
no description
|
|||
column
integer
|
Default:
0
|
Widgets column ID.
|
||
diskio-content-type
string
|
|
Disk I/O Monitor widgets chart type.
util - bandwidth utilization.
iops - the number of I/O requests.
blks - the amount of data of I/O requests.
|
||
diskio-period
string
|
|
Disk I/O Monitor widgets data period.
1hour - 1 hour.
8hour - 8 hour.
24hour - 24 hour.
|
||
log-rate-period
string
|
|
Log receive monitor widgets data period.
2min - 2 minutes.
1hour - 1 hour.
6hours - 6 hours.
|
||
log-rate-topn
string
|
|
Log receive monitor widgets number of top items to display.
1 - Top 1.
2 - Top 2.
3 - Top 3.
4 - Top 4.
5 - Top 5.
|
||
log-rate-type
string
|
|
Log receive monitor widgets statistics breakdown options.
log - Show log rates for each log type.
device - Show log rates for each device.
|
||
moduleid
integer
|
Default:
0
|
Widget ID.
|
||
name
string
|
Widget name.
|
|||
num-entries
integer
|
Default:
10
|
Number of entries.
|
||
refresh-interval
integer
|
Default:
300
|
Widgets refresh interval.
|
||
res-cpu-display
string
|
|
Widgets CPU display type.
average - Average usage of CPU.
each - Each usage of CPU.
|
||
res-period
string
|
|
Widgets data period.
10min - Last 10 minutes.
hour - Last hour.
day - Last day.
|
||
res-view-type
string
|
|
Widgets data view type.
real-time - Real-time view.
history - History view.
|
||
status
string
|
|
Widgets opened/closed state.
close - Widget closed.
open - Widget opened.
|
||
tabid
integer
|
Default:
0
|
ID of tab where widget is displayed.
|
||
time-period
string
|
|
Log Database Monitor widgets data period.
1hour - 1 hour.
8hour - 8 hour.
24hour - 24 hour.
|
||
widget-type
string
|
|
Widget type.
top-lograte - Log Receive Monitor.
sysres - System resources.
sysinfo - System Information.
licinfo - License Information.
jsconsole - CLI Console.
sysop - Unit Operation.
alert - Alert Message Console.
statistics - Statistics.
rpteng - Report Engine.
raid - Disk Monitor.
logrecv - Logs/Data Received.
devsummary - Device Summary.
logdb-perf - Log Database Performance Monitor.
logdb-lag - Log Database Lag Time.
disk-io - Disk I/O.
log-rcvd-fwd - Log receive and forwarding Monitor.
|
||
dashboard-tabs
list / elements=string
|
no description
|
|||
name
string
|
Tab name.
|
|||
tabid
integer
|
Default:
0
|
Tab ID.
|
||
description
string
|
Description.
|
|||
dev-group
string
|
device group.
|
|||
email-address
string
|
Email address.
|
|||
ext-auth-accprofile-override
string
|
|
Allow to use the access profile provided by the remote authentication server.
disable - Disable access profile override.
enable - Enable access profile override.
|
||
ext-auth-adom-override
string
|
|
Allow to use the ADOM provided by the remote authentication server.
disable - Disable ADOM override.
enable - Enable ADOM override.
|
||
ext-auth-group-match
string
|
Only administrators belonging to this group can login.
|
|||
first-name
string
|
First name.
|
|||
force-password-change
string
|
|
Enable/disable force password change on next login.
disable - Disable setting.
enable - Enable setting.
|
||
group
string
|
Group name.
|
|||
hidden
integer
|
Default:
0
|
Hidden administrator.
|
||
ips-filter
list / elements=string
|
no description
|
|||
ips-filter-name
string
|
IPS filter name.
|
|||
ipv6_trusthost1
string
|
Default:
"::/0"
|
Admin user trusted host IPv6, default ::/0 for all.
|
||
ipv6_trusthost10
string
|
Default:
"ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff/128"
|
Admin user trusted host IPv6, default ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff/128 for none.
|
||
ipv6_trusthost2
string
|
Default:
"ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff/128"
|
Admin user trusted host IPv6, default ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff/128 for none.
|
||
ipv6_trusthost3
string
|
Default:
"ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff/128"
|
Admin user trusted host IPv6, default ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff/128 for none.
|
||
ipv6_trusthost4
string
|
Default:
"ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff/128"
|
Admin user trusted host IPv6, default ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff/128 for none.
|
||
ipv6_trusthost5
string
|
Default:
"ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff/128"
|
Admin user trusted host IPv6, default ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff/128 for none.
|
||
ipv6_trusthost6
string
|
Default:
"ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff/128"
|
Admin user trusted host IPv6, default ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff/128 for none.
|
||
ipv6_trusthost7
string
|
Default:
"ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff/128"
|
Admin user trusted host IPv6, default ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff/128 for none.
|
||
ipv6_trusthost8
string
|
Default:
"ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff/128"
|
Admin user trusted host IPv6, default ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff/128 for none.
|
||
ipv6_trusthost9
string
|
Default:
"ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff/128"
|
Admin user trusted host IPv6, default ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff/128 for none.
|
||
last-name
string
|
Last name.
|
|||
ldap-server
string
|
LDAP server name.
|
|||
login-max
integer
|
Default:
32
|
Max login session for this user.
|
||
meta-data
list / elements=string
|
no description
|
|||
fieldlength
integer
|
Default:
0
|
Field length.
|
||
fieldname
string
|
Field name.
|
|||
fieldvalue
string
|
Field value.
|
|||
importance
string
|
|
Importance.
optional - This field is optional.
required - This field is required.
|
||
status
string
|
|
Status.
disabled - This field is disabled.
enabled - This field is enabled.
|
||
mobile-number
string
|
Mobile number.
|
|||
pager-number
string
|
Pager number.
|
|||
password
string
|
no description
|
|||
password-expire
string
|
no description
|
|||
phone-number
string
|
Phone number.
|
|||
policy-package
list / elements=string
|
no description
|
|||
policy-package-name
string
|
Policy package names.
|
|||
profileid
string
|
Default:
"Restricted_User"
|
Profile ID.
|
||
radius_server
string
|
RADIUS server name.
|
|||
restrict-access
string
|
|
Enable/disable restricted access to development VDOM.
disable - Disable setting.
enable - Enable setting.
|
||
restrict-dev-vdom
list / elements=string
|
no description
|
|||
dev-vdom
string
|
Device or device VDOM.
|
|||
rpc-permit
string
|
|
set none/read/read-write rpc-permission.
read-write - Read-write permission.
none - No permission.
read - Read-only permission.
|
||
ssh-public-key1
string
|
no description
|
|||
ssh-public-key2
string
|
no description
|
|||
ssh-public-key3
string
|
no description
|
|||
subject
string
|
PKI user certificate name constraints.
|
|||
tacacs-plus-server
string
|
TACACS+ server name.
|
|||
trusthost1
string
|
Default:
"0.0.0.0 0.0.0.0"
|
Admin user trusted host IP, default 0.0.0.0 0.0.0.0 for all.
|
||
trusthost10
string
|
Default:
"255.255.255.255 255.255.255.255"
|
Admin user trusted host IP, default 255.255.255.255 255.255.255.255 for none.
|
||
trusthost2
string
|
Default:
"255.255.255.255 255.255.255.255"
|
Admin user trusted host IP, default 255.255.255.255 255.255.255.255 for none.
|
||
trusthost3
string
|
Default:
"255.255.255.255 255.255.255.255"
|
Admin user trusted host IP, default 255.255.255.255 255.255.255.255 for none.
|
||
trusthost4
string
|
Default:
"255.255.255.255 255.255.255.255"
|
Admin user trusted host IP, default 255.255.255.255 255.255.255.255 for none.
|
||
trusthost5
string
|
Default:
"255.255.255.255 255.255.255.255"
|
Admin user trusted host IP, default 255.255.255.255 255.255.255.255 for none.
|
||
trusthost6
string
|
Default:
"255.255.255.255 255.255.255.255"
|
Admin user trusted host IP, default 255.255.255.255 255.255.255.255 for none.
|
||
trusthost7
string
|
Default:
"255.255.255.255 255.255.255.255"
|
Admin user trusted host IP, default 255.255.255.255 255.255.255.255 for none.
|
||
trusthost8
string
|
Default:
"255.255.255.255 255.255.255.255"
|
Admin user trusted host IP, default 255.255.255.255 255.255.255.255 for none.
|
||
trusthost9
string
|
Default:
"255.255.255.255 255.255.255.255"
|
Admin user trusted host IP, default 255.255.255.255 255.255.255.255 for none.
|
||
two-factor-auth
string
|
|
Enable 2-factor authentication (certificate + password).
disable - Disable 2-factor authentication.
enable - Enable 2-factor authentication.
|
||
use-global-theme
string
|
|
Enable/disble global theme for administration GUI.
disable - Disable setting.
enable - Enable setting.
|
||
user-theme
string
|
|
Color scheme to use for the admin user GUI.
blue - Blueberry
green - Kiwi
red - Cherry
melongene - Plum
spring - Spring
summer - Summer
autumn - Autumn
winter - Winter
circuit-board - Circuit Board
calla-lily - Calla Lily
binary-tunnel - Binary Tunnel
mars - Mars
blue-sea - Blue Sea
technology - Technology
landscape - Landscape
twilight - Twilight
canyon - Canyon
northern-light - Northern Light
astronomy - Astronomy
fish - Fish
penguin - Penguin
mountain - Mountain
panda - Panda
parrot - Parrot
cave - Cave
zebra - Zebra
contrast-dark - High Contrast Dark
|
||
user_type
string
|
|
User type.
local - Local user.
radius - RADIUS user.
ldap - LDAP user.
tacacs-plus - TACACS+ user.
pki-auth - PKI user.
group - Group user.
|
||
userid
string
|
User name.
|
|||
web-filter
list / elements=string
|
no description
|
|||
web-filter-name
string
|
Web filter name.
|
|||
wildcard
string
|
|
Enable/disable wildcard remote authentication.
disable - Disable username wildcard.
enable - Enable username wildcard.
|
||
workspace_locking_adom
string
|
the adom to lock for FortiManager running in workspace mode, the value can be global and others including root
|
|||
workspace_locking_timeout
integer
|
Default:
300
|
the maximum time in seconds to wait for other user to release the workspace lock
|
Notes
Note
- Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace_locking_adom and workspace_locking_timeout help do the work.
- To create or update an object, use state present directive.
- To delete an object, use state absent directive.
- Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc_failed and rc_succeeded
Examples
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Admin user.
fmgr_system_admin_user:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
state: <value in [present, absent]>
system_admin_user:
adom:
-
adom-name: <value of string>
adom-exclude:
-
adom-name: <value of string>
app-filter:
-
app-filter-name: <value of string>
avatar: <value of string>
ca: <value of string>
change-password: <value in [disable, enable]>
dashboard:
-
column: <value of integer>
diskio-content-type: <value in [util, iops, blks]>
diskio-period: <value in [1hour, 8hour, 24hour]>
log-rate-period: <value in [2min , 1hour, 6hours]>
log-rate-topn: <value in [1, 2, 3, ...]>
log-rate-type: <value in [log, device]>
moduleid: <value of integer>
name: <value of string>
num-entries: <value of integer>
refresh-interval: <value of integer>
res-cpu-display: <value in [average , each]>
res-period: <value in [10min , hour, day]>
res-view-type: <value in [real-time , history]>
status: <value in [close, open]>
tabid: <value of integer>
time-period: <value in [1hour, 8hour, 24hour]>
widget-type: <value in [top-lograte, sysres, sysinfo, ...]>
dashboard-tabs:
-
name: <value of string>
tabid: <value of integer>
description: <value of string>
dev-group: <value of string>
email-address: <value of string>
ext-auth-accprofile-override: <value in [disable, enable]>
ext-auth-adom-override: <value in [disable, enable]>
ext-auth-group-match: <value of string>
first-name: <value of string>
force-password-change: <value in [disable, enable]>
group: <value of string>
hidden: <value of integer>
ips-filter:
-
ips-filter-name: <value of string>
ipv6_trusthost1: <value of string>
ipv6_trusthost10: <value of string>
ipv6_trusthost2: <value of string>
ipv6_trusthost3: <value of string>
ipv6_trusthost4: <value of string>
ipv6_trusthost5: <value of string>
ipv6_trusthost6: <value of string>
ipv6_trusthost7: <value of string>
ipv6_trusthost8: <value of string>
ipv6_trusthost9: <value of string>
last-name: <value of string>
ldap-server: <value of string>
meta-data:
-
fieldlength: <value of integer>
fieldname: <value of string>
fieldvalue: <value of string>
importance: <value in [optional, required]>
status: <value in [disabled, enabled]>
mobile-number: <value of string>
pager-number: <value of string>
password: <value of string>
password-expire: <value of string>
phone-number: <value of string>
policy-package:
-
policy-package-name: <value of string>
profileid: <value of string>
radius_server: <value of string>
restrict-access: <value in [disable, enable]>
restrict-dev-vdom:
-
dev-vdom: <value of string>
rpc-permit: <value in [read-write, none, read]>
ssh-public-key1: <value of string>
ssh-public-key2: <value of string>
ssh-public-key3: <value of string>
subject: <value of string>
tacacs-plus-server: <value of string>
trusthost1: <value of string>
trusthost10: <value of string>
trusthost2: <value of string>
trusthost3: <value of string>
trusthost4: <value of string>
trusthost5: <value of string>
trusthost6: <value of string>
trusthost7: <value of string>
trusthost8: <value of string>
trusthost9: <value of string>
two-factor-auth: <value in [disable, enable]>
user_type: <value in [local, radius, ldap, ...]>
userid: <value of string>
web-filter:
-
web-filter-name: <value of string>
wildcard: <value in [disable, enable]>
login-max: <value of integer>
use-global-theme: <value in [disable, enable]>
user-theme: <value in [blue, green, red, ...]>
Return Values
Common return values are documented here, the following are the fields unique to this module:
Key | Returned | Description |
---|---|---|
request_url
string
|
always |
The full url requested
Sample:
/sys/login/user
|
response_code
integer
|
always |
The status of api request
|
response_message
string
|
always |
The descriptive message of the api response
Sample:
OK.
|
Authors
- Link Zheng (@chillancezen)
- Jie Xue (@JieX19)
- Frank Shen (@fshen01)
- Hongbin Lu (@fgtdev-hblu)
© 2012–2018 Michael DeHaan
© 2018–2021 Red Hat, Inc.
Licensed under the GNU General Public License version 3.
https://docs.ansible.com/ansible/latest/collections/fortinet/fortimanager/fmgr_system_admin_user_module.html