ios_user - Manage the aggregate of local users on Cisco IOS device
New in version 2.4.
Synopsis
- This module provides declarative management of the local usernames configured on network devices. It allows playbooks to manage either individual usernames or the aggregate of usernames in the current running config. It also supports purging usernames from the configuration that are not explicitly defined.
Options
parameter | required | default | choices | comments |
---|---|---|---|---|
aggregate | no | The set of username objects to be configured on the remote Cisco IOS device. The list entries can either be the username or a hash of username and properties. This argument is mutually exclusive with the name argument. alias users . | ||
configured_password | no | The password to be configured on the Cisco IOS device. The password needs to be provided in clear and it will be encrypted on the device. Please note that this option is not same as provider password . | ||
name | no | The username to be configured on the Cisco IOS device. This argument accepts a string value and is mutually exclusive with the aggregate argument. Please note that this option is not same as provider username . | ||
nopassword | no |
| Defines the username without assigning a password. This will allow the user to login to the system without being authenticated by a password. | |
privilege | no | The privilege argument configures the privilege level of the user when logged into the system. This argument accepts integer values in the range of 1 to 15. | ||
purge | no |
| Instructs the module to consider the resource definition absolute. It will remove any previously configured usernames on the device with the exception of the `admin` user (the current defined set of users). | |
state | no | present |
| Configures the state of the username definition as it relates to the device operational configuration. When set to present, the username(s) should be configured in the device active configuration and when set to absent the username(s) should not be in the device active configuration |
update_password | no | always |
| Since passwords are encrypted in the device running config, this argument will instruct the module when to change the password. When set to always , the password will always be updated in the device and when set to on_create the password will be updated only if the username is created. |
view | no | Configures the view for the username in the device running configuration. The argument accepts a string value defining the view name. This argument does not check if the view has been configured on the device. |
Examples
- name: create a new user ios_user: name: ansible nopassword: True state: present - name: remove all users except admin ios_user: purge: yes - name: set multiple users to privilege level 15 ios_user: aggregate: - name: netop - name: netend privilege: 15 state: present - name: set user view/role ios_user: name: netop view: network-operator state: present - name: Change Password for User netop ios_user: name: netop configured_password: "{{ new_password }}" update_password: always state: present - name: Aggregate of users ios_user: aggregate: - name: ansibletest2 - name: ansibletest3 view: network-admin - name: Delete users with aggregate ios_user: aggregate: - name: ansibletest1 - name: ansibletest2 - name: ansibletest3 state: absent
Return Values
Common return values are documented here Return Values, the following are the fields unique to this module:
name | description | returned | type | sample |
---|---|---|---|---|
commands | The list of configuration mode commands to send to the device | always | list | ['username ansible secret password', 'username admin secret admin'] |
Notes
Note
- Tested against IOS 15.6
Status
This module is flagged as preview which means that it is not guaranteed to have a backwards compatible interface.
Maintenance Info
For more information about Red Hat’s this support of this module, please refer to this knowledge base article<https://access.redhat.com/articles/rhel-top-support-policies>
For help in developing on modules, should you be so inclined, please read Community Information & Contributing, Testing Ansible and Developing Modules.
© 2012–2018 Michael DeHaan
© 2018–2019 Red Hat, Inc.
Licensed under the GNU General Public License version 3.
https://docs.ansible.com/ansible/2.4/ios_user_module.html