Rechercher

Ce contenu n'est pas disponible dans la langue sélectionnée.

Chapter 7. Managing credentials

download PDF

Credentials authenticate the controller user to launch Ansible playbooks. The passwords and SSH keys are used to authenticate against inventory hosts. By using the credentials feature of automation controller, you can require the automation controller user to enter a password or key phrase when a playbook launches.

7.1. Creating new credentials

As part of the initial setup, a demonstration credential and a Galaxy credential have been created for your use. Use the Galaxy credential as a template. It can be copied, but not edited. You can add more credentials as necessary.

Procedure

  1. From the navigation panel, select Resources Credentials.
  2. To add a new credential, see Creating a credential in the Automation controller User Guide.

    Note

    When you set up additional credentials, the user you assign must have root access or be able to use SSH to connect to the host machine.

  3. Click Demo Credential to view its details.
Demo Credential

7.2. Editing a credential

As part of the initial setup, you can leave the default Demo Credential as it is, and you can edit it later.

Procedure

  1. Edit the credential by using one of these methods:

    • Go to the credential Details page and click Edit.
    • From the navigation panel, select Resources Credentials. Click Edit next to the credential name and edit the appropriate details.
  2. Save your changes.
Red Hat logoGithubRedditYoutubeTwitter

Apprendre

Essayez, achetez et vendez

Communautés

À propos de la documentation Red Hat

Nous aidons les utilisateurs de Red Hat à innover et à atteindre leurs objectifs grâce à nos produits et services avec un contenu auquel ils peuvent faire confiance.

Rendre l’open source plus inclusif

Red Hat s'engage à remplacer le langage problématique dans notre code, notre documentation et nos propriétés Web. Pour plus de détails, consultez leBlog Red Hat.

À propos de Red Hat

Nous proposons des solutions renforcées qui facilitent le travail des entreprises sur plusieurs plates-formes et environnements, du centre de données central à la périphérie du réseau.

© 2024 Red Hat, Inc.