Forge Home

cas

Puppet module to manage CAS

7,661 downloads

5,570 latest version

5.0 quality score

We run a couple of automated
scans to help you access a
module's quality. Each module is
given a score based on how well
the author has formatted their
code and documentation and
modules are also checked for
malware using VirusTotal.

Please note, the information below
is for guidance only and neither of
these methods should be considered
an endorsement by Puppet.

Version information

  • 1.0.1 (latest)
  • 1.0.0
  • 0.2.0
released Jun 23rd 2018
This version is compatible with:
  • Puppet Enterprise 2018.1.x, 2017.3.x, 2017.2.x, 2017.1.x, 2016.5.x, 2016.4.x
  • Puppet >= 2.7.20 < 6.0.0

Start using this module

  • r10k or Code Manager
  • Bolt
  • Manual installation
  • Direct download

Add this module to your Puppetfile:

mod 'soli-cas', '1.0.1'
Learn more about managing modules with a Puppetfile

Add this module to your Bolt project:

bolt module add soli-cas
Learn more about using this module with an existing project

Manually install this module globally with Puppet module tool:

puppet module install soli-cas --version 1.0.1

Direct download is not typically how you would use a Puppet module to manage your infrastructure, but you may want to download the module in order to inspect the code.

Download
Tags: cas, sso

Documentation

soli/cas — version 1.0.1 Jun 23rd 2018

cas

Puppet Forge Version Puppet Forge Downloads Puppet Forge Score Build Status

Table of Contents

  1. Description
  2. Setup - The basics of getting started with CAS
  3. Usage - Configuration options and additional functionality
  4. Reference - An under-the-hood peek at what the module is doing and how
  5. Limitations - OS compatibility, etc.
  6. Development - Guide for contributing to the module
  7. Contributors

Description

This module configures CAS.

Setup

Beginning with CAS

class { 'cas': }

Usage

Add a service

cas::service { 'Jenkins':
  service_id  => '^https://myserver.+jenkins.+',
  id          => '100',
  enabled     => true,
  sso_enabled => true,
},

Reference

Classes

Public classes

  • cas: Main class, includes all other classes.

Private classes

  • cas::params: Sets parameter defaults per operating system.

Parameters

server_name

Url of the server. Valid option: string. Default value: "http://localhost/"

service_directory

Directory where the services are configured. Valid option: string. Default value: "/etc/cas/services"

ldap_url

URL of the LDAP server. Valid option: string. Default value: undef

ldap_use_start_tls

Whether TLS is used. Valid option: boolean. Default value: false

ldap_use_ssl

Whether SSL is used. Valid option: boolean. Default value: false

ldap_trusted_cert

Whether trusted certificate is used. Valid option: boolean. Default value: false

ldap_root_dn

LDAP root DN. Valid option: string. Default value: undef

ldap_base_dn

LDAP base DN. Valid option: string. Default value: undef

ldap_manager_dn

LDAP manager DN. Valid option: string. Default value: undef

ldap_manager_password

LDAP manager password. Valid option: string. Default value: undef

ldap_domain

LDAP domain. Valid option: string. Default value: undef

ldap_search_filter

LDAP search filter. Valid option: string. Default value: undef

Defines

Public Defines

  • cas::service: Adds a CAS service.

Parameters

The following parameters are available in the ::cas::service define:

service_id

Required Ant pattern or regular expression describing a logical service. A logical service defines one or more URLs where a service or services are located. The definition of the url pattern must be done carefully because it can open security breaches. Valid options: string. Default value: undef

id

Required unique identifier. Valid option: numeric. Default value: undef

enabled

Flag to toggle whether the entry is active; a disabled entry produces behavior equivalent to a non-existent entry. Valid option: boolean. Default value: true

sso_enabled

Set to false to force users to authenticate to the service regardless of protocol flags (e.g. renew=true). This flag provides some support for centralized application of security policy. Valid option: boolean. Default value: true

Limitations

Debian family OSes are officially supported. Tested and built on Debian.

Development

Solution Libre modules on the Puppet Forge are open projects, and community contributions are essential for keeping them great.

Fork this module on GitHub

Contributors

The list of contributors can be found at: https://github.com/solution-libre/puppet-cas/graphs/contributors