Ansible Plugin
The Akeyless official plugin for Ansible provides modules and plugins to securely manage secrets, credentials, and sensitive data within playbooks. It helps maintain efficient and secure automation workflows, allowing teams to simplify secret management while protecting critical information.
You can manage secrets and certificates with either Modules or Lookup plugins. In this guide, we will use Modules for simplicity. More information about the Lookup plugin can be found here.
Installation
To install the Akeyless Ansible plugin, run the following command:
pip install akeyless-ansible
Authentication
This plugin supports the following Authentication Methods:
To set the Authentication Method, add the following login
section to your Ansible Playbook:
login:
akeyless_api_url: 'https://api.akeyless.io'
access_id: '<Access ID>'
access_type: 'api_key'
access_key: '<Access Key>'
login:
akeyless_api_url: 'https://api.akeyless.io'
access_id: '<Access ID>'
access_type: 'aws_iam'
cloud_id: '<cloud_id>'
login:
akeyless_api_url: 'https://api.akeyless.io'
access_id: '<Access ID>'
access_type: 'gcp'
cloud_id: '<cloud_id>'
gcp_audience: <'gcp_audience'>
login:
akeyless_api_url: 'https://api.akeyless.io'
access_id: '<Access ID>'
access_type: 'azure_ad'
cloud_id: '<cloud_id>'
login:
akeyless_api_url: 'https://api.akeyless.io'
access_id: '<Access ID>'
access_type: 'password'
admin_password: '<admin_password>'
admin_email: '<admin_email>'
account_id: '<account_id>'
login:
akeyless_api_url: 'https://api.akeyless.io'
access_id: '<Access ID>'
access_type: 'k8s'
k8s_service_account_token: '<k8s_service_account_token>'
k8s_auth_config_name: '<k8s_auth_config_name>'
akeyless_gateway_url: 'https://Your-Akelyess-Gateway-URL:8000'
login:
akeyless_api_url: 'https://api.akeyless.io'
access_id: '<Access ID>'
access_type: 'oci'
oci_auth_type: '<oci_auth_type>'
oci_group_ocid: '<oci_group_ocid>'
login:
akeyless_api_url: 'https://api.akeyless.io'
access_id: '<Access ID>'
access_type: 'ldap'
ldap_username: <'ldap_username'>
ldap_password: <'ldap_password'>
login:
akeyless_api_url: 'https://api.akeyless.io'
access_id: '<Access ID>'
access_type: 'jwt'
jwt: '<jwt value>'
akeyless_gateway_url: 'https://Your-Akelyess-Gateway-URL:8000'
login:
akeyless_api_url: 'https://api.akeyless.io'
access_id: '<Access ID>'
access_type: 'oidc'
use_remote_browser: 'true / false'
jwt: '<jwt value>'
akeyless_gateway_url: 'https://Your-Akelyess-Gateway-URL:8000'
login:
akeyless_api_url: 'https://api.akeyless.io'
access_id: '<Access ID>'
access_type: 'jwt'
use_remote_browser: 'true | false'
akeyless_gateway_url: 'https://Your-Akelyess-Gateway-URL:8000'
login:
akeyless_api_url: 'https://api.akeyless.io'
access_id: '<Access ID>'
access_type: 'universal_identity'
use_remote_browser: 'true | false'
uid_token: '<uid_token>
Where:
-
akeyless_api_url
: Gateway URL API V2 endpoint i.e.https://Your_GW_URL:8000/api/v2
. -
access_id
: TheAccess ID
of the Auth Method being used. -
access_type
: The type of the Auth Method being used. -
cloud_id
: Thecloud_id
, can be retrieved by running:akeyless get-cloud-identity
-
akeyless_gateway_url
: Akeyless Gateway Configuration Manager URL (port8000
).
Usage
This section provides examples of fetching secrets and certificates and creating a Static Secret.
To create an Ansible Playbook, create a yaml
file containing the configuration below.
Static Secret Example
Create a Static Secret
The following will create a Static Secret named '/Ansible/MySecret'
:
- name: Create Static Secret
hosts: localhost
tasks:
- name: Get temp token using api_key auth method
login:
akeyless_api_url: 'https://api.akeyless.io'
access_type: 'api_key'
access_id: '<Access ID>'
access_key: '<Access Key>'
register: auth_res
- name: create static secret item
create_static_secret:
akeyless_api_url: 'https://api.akeyless.io'
name: '/Ansible/MySecret'
value: "AnsibleSecret"
token: '{{ auth_res.data.token }}'
register: response
Where:
-
name
: the name of the Static Secret. -
value
: the value of the Static Secret. -
type
: The Secret type [generic
orpassword
]. -
format
: The Secret format [text
|json
|key-value
].
Additional parameters for this module can be found in the official Ansible Repository.
Fetch a Static Secret
The following will fetch a Static Secret named /Ansible/MySecret
:
- name: Get secret value
hosts: localhost
tasks:
- name: Get temp token using api_key auth method
login:
akeyless_api_url: 'https://api.akeyless.io'
access_type: 'api_key'
access_id: '<Access ID>'
access_key: '<Access Key>'
register: auth_res
- name: Get item secret value by name
get_static_secret_value:
akeyless_api_url: 'https://api.akeyless.io'
names: '/Ansible/MySecret'
token: '{{ auth_res.data.token }}'
register: response
- name: Display the results
debug:
msg: "Secret Value: {{ response.data }}"
Where:
-
akeyless_api_url
: Gateway URL API V2 endpoint i.e.https://Your_GW_URL:8000/api/v2
. -
names
: The name of the secret.
Additional parameters for this module can be found in the official Ansible Repository
Dynamic Secret Example
The following will fetch a Dynamic Secret named Ansible/MyDynamicSecret
:
- name: Get secret value
hosts: localhost
tasks:
- name: Get temp token using api_key auth method
login:
akeyless_api_url: 'https://api.akeyless.io'
access_type: 'api_key'
access_id: '<Access ID>'
access_key: '<Access Key>'
register: auth_res
- name: Get item secret value by name
get_dynamic_secret_value:
akeyless_api_url: 'https://api.akeyless.io'
name: '/Ansible/MyDynamicSecret'
token: '{{ auth_res.data.token }}'
register: response
- name: Display the results
debug:
msg: "Secret Value: {{ response.data }}"
Additional parameters for this module can be found in the official Ansible Repository
Rotated Secret Example
The following will fetch a Rotated Secret named Ansible/MyRotatedSecret
:
- name: Get secret value
hosts: localhost
tasks:
- name: Get temp token using api_key auth method
login:
akeyless_api_url: 'https://api.akeyless.io'
access_type: 'api_key'
access_id: '<Access ID>'
access_key: '<Access Key>'
register: auth_res
- name: Get item secret value by name
get_rotated_secret_value:
akeyless_api_url: 'https://api.akeyless.io'
name: '/Ansible/MyRotatedSecret'
token: '{{ auth_res.data.token }}'
register: response
- name: Display the results
debug:
msg: "Secret Value: {{ response.data }}"
Additional parameters for this module can be found in the official Ansible Repository
SSH Certificate Example
The following will issue and fetch an SSH Certificate:
- name: Get certificate value
hosts: localhost
tasks:
- name: Get temp token using api-key auth method
login:
akeyless_api_url: 'https://api.akeyless.io'
access_type: 'api_key'
access_id: '<Access ID>'
access_key: '<Access Key>'
register: auth_res
- name: Get SSH certificate
get_ssh_certificate:
akeyless_api_url: 'https://api.akeyless.io'
cert_issuer_name: "/Ansible/cert_issuer_name"
cert_username: "<Username>"
public_key_data: "<public_key_data>"
token: '{{ auth_res.data.token }}'
register: result
- name: Display the RSA key
debug:
msg: "{{ result.data.data }}"
Where:
-
akeyless_api_url
: Gateway URL API V2 endpoint i.e.https://Your_GW_URL:8000/api/v2
. -
cert_issuer_name
: The name of the SSH Certificate Issuer. -
cert_username
: The username to sign in the SSH certificate. -
public_key_data
: SSH Public Key. -
ttl
: Optional, Updated certificate lifetime in seconds (must be less than the Certificate Issuer default TTL). -
legacy_signing_alg_name
: Optional, Set this option to output legacy[email protected]
signing algorithm name in the certificate.
PKI Certificate Example
The following will issue and fetch a PKI certificate:
- name: Get certificate value
hosts: localhost
tasks:
- name: Get temp token using api_key auth method
login:
akeyless_api_url: 'https://api.akeyless.io'
access_type: 'api_key'
access_id: '<Access ID>'
access_key: '<Access Key>'
register: auth_res
- name: Get PKI certificate
get_pki_certificate:
akeyless_api_url: 'https://api.akeyless.io'
cert_issuer_name: "/Ansible/pki_issuer_name"
csr_data_base64: "<csr_data_base64>"
token: '{{ auth_res.data.token }}'
register: result
- name: Display the result of the operation
debug:
msg: "{{ result }}"
- name: Display the RSA key
debug:
msg: "{{ result.data.data }}"
Where:
-
akeyless_api_url
: Gateway URL API V2 endpoint i.e.https://Your_GW_URL:8000/api/v2
. -
cert_issuer_name
: The name of the PKI Certificate Issuer. -
csr_data_base64
: Certificate Signing Request contents encoded inbase64
to generate the certificate with.
Additional parameters for this module can be found in the official Ansible Repository.
Updated 6 days ago