1. Packages
  2. Fortios
  3. API Docs
  4. user
  5. Krbkeytab
Fortios v0.0.6 published on Tuesday, Jul 9, 2024 by pulumiverse

fortios.user.Krbkeytab

Explore with Pulumi AI

Configure Kerberos keytab entries.

Example Usage

import * as pulumi from "@pulumi/pulumi";
import * as fortios from "@pulumiverse/fortios";

const trname2 = new fortios.user.Ldap("trname2", {
    accountKeyFilter: "(&(userPrincipalName=%s)(!(UserAccountControl:1.2.840.113556.1.4.803:=2)))",
    accountKeyProcessing: "same",
    cnid: "cn",
    dn: "EIWNCIEW",
    groupMemberCheck: "user-attr",
    groupObjectFilter: "(&(objectcategory=group)(member=*))",
    memberAttr: "memberOf",
    passwordExpiryWarning: "disable",
    passwordRenewal: "disable",
    port: 389,
    secure: "disable",
    server: "1.1.1.1",
    serverIdentityCheck: "disable",
    sourceIp: "0.0.0.0",
    sslMinProtoVersion: "default",
    type: "simple",
});
const trname = new fortios.user.Krbkeytab("trname", {
    keytab: "ZXdlY2VxcmVxd3Jld3E=",
    ldapServer: trname2.name,
    principal: "testprin",
});
Copy
import pulumi
import pulumiverse_fortios as fortios

trname2 = fortios.user.Ldap("trname2",
    account_key_filter="(&(userPrincipalName=%s)(!(UserAccountControl:1.2.840.113556.1.4.803:=2)))",
    account_key_processing="same",
    cnid="cn",
    dn="EIWNCIEW",
    group_member_check="user-attr",
    group_object_filter="(&(objectcategory=group)(member=*))",
    member_attr="memberOf",
    password_expiry_warning="disable",
    password_renewal="disable",
    port=389,
    secure="disable",
    server="1.1.1.1",
    server_identity_check="disable",
    source_ip="0.0.0.0",
    ssl_min_proto_version="default",
    type="simple")
trname = fortios.user.Krbkeytab("trname",
    keytab="ZXdlY2VxcmVxd3Jld3E=",
    ldap_server=trname2.name,
    principal="testprin")
Copy
package main

import (
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
	"github.com/pulumiverse/pulumi-fortios/sdk/go/fortios/user"
)

func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		trname2, err := user.NewLdap(ctx, "trname2", &user.LdapArgs{
			AccountKeyFilter:      pulumi.String("(&(userPrincipalName=%s)(!(UserAccountControl:1.2.840.113556.1.4.803:=2)))"),
			AccountKeyProcessing:  pulumi.String("same"),
			Cnid:                  pulumi.String("cn"),
			Dn:                    pulumi.String("EIWNCIEW"),
			GroupMemberCheck:      pulumi.String("user-attr"),
			GroupObjectFilter:     pulumi.String("(&(objectcategory=group)(member=*))"),
			MemberAttr:            pulumi.String("memberOf"),
			PasswordExpiryWarning: pulumi.String("disable"),
			PasswordRenewal:       pulumi.String("disable"),
			Port:                  pulumi.Int(389),
			Secure:                pulumi.String("disable"),
			Server:                pulumi.String("1.1.1.1"),
			ServerIdentityCheck:   pulumi.String("disable"),
			SourceIp:              pulumi.String("0.0.0.0"),
			SslMinProtoVersion:    pulumi.String("default"),
			Type:                  pulumi.String("simple"),
		})
		if err != nil {
			return err
		}
		_, err = user.NewKrbkeytab(ctx, "trname", &user.KrbkeytabArgs{
			Keytab:     pulumi.String("ZXdlY2VxcmVxd3Jld3E="),
			LdapServer: trname2.Name,
			Principal:  pulumi.String("testprin"),
		})
		if err != nil {
			return err
		}
		return nil
	})
}
Copy
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Fortios = Pulumiverse.Fortios;

return await Deployment.RunAsync(() => 
{
    var trname2 = new Fortios.User.Ldap("trname2", new()
    {
        AccountKeyFilter = "(&(userPrincipalName=%s)(!(UserAccountControl:1.2.840.113556.1.4.803:=2)))",
        AccountKeyProcessing = "same",
        Cnid = "cn",
        Dn = "EIWNCIEW",
        GroupMemberCheck = "user-attr",
        GroupObjectFilter = "(&(objectcategory=group)(member=*))",
        MemberAttr = "memberOf",
        PasswordExpiryWarning = "disable",
        PasswordRenewal = "disable",
        Port = 389,
        Secure = "disable",
        Server = "1.1.1.1",
        ServerIdentityCheck = "disable",
        SourceIp = "0.0.0.0",
        SslMinProtoVersion = "default",
        Type = "simple",
    });

    var trname = new Fortios.User.Krbkeytab("trname", new()
    {
        Keytab = "ZXdlY2VxcmVxd3Jld3E=",
        LdapServer = trname2.Name,
        Principal = "testprin",
    });

});
Copy
package generated_program;

import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.fortios.user.Ldap;
import com.pulumi.fortios.user.LdapArgs;
import com.pulumi.fortios.user.Krbkeytab;
import com.pulumi.fortios.user.KrbkeytabArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;

public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }

    public static void stack(Context ctx) {
        var trname2 = new Ldap("trname2", LdapArgs.builder()
            .accountKeyFilter("(&(userPrincipalName=%s)(!(UserAccountControl:1.2.840.113556.1.4.803:=2)))")
            .accountKeyProcessing("same")
            .cnid("cn")
            .dn("EIWNCIEW")
            .groupMemberCheck("user-attr")
            .groupObjectFilter("(&(objectcategory=group)(member=*))")
            .memberAttr("memberOf")
            .passwordExpiryWarning("disable")
            .passwordRenewal("disable")
            .port(389)
            .secure("disable")
            .server("1.1.1.1")
            .serverIdentityCheck("disable")
            .sourceIp("0.0.0.0")
            .sslMinProtoVersion("default")
            .type("simple")
            .build());

        var trname = new Krbkeytab("trname", KrbkeytabArgs.builder()
            .keytab("ZXdlY2VxcmVxd3Jld3E=")
            .ldapServer(trname2.name())
            .principal("testprin")
            .build());

    }
}
Copy
resources:
  trname2:
    type: fortios:user:Ldap
    properties:
      accountKeyFilter: (&(userPrincipalName=%s)(!(UserAccountControl:1.2.840.113556.1.4.803:=2)))
      accountKeyProcessing: same
      cnid: cn
      dn: EIWNCIEW
      groupMemberCheck: user-attr
      groupObjectFilter: (&(objectcategory=group)(member=*))
      memberAttr: memberOf
      passwordExpiryWarning: disable
      passwordRenewal: disable
      port: 389
      secure: disable
      server: 1.1.1.1
      serverIdentityCheck: disable
      sourceIp: 0.0.0.0
      sslMinProtoVersion: default
      type: simple
  trname:
    type: fortios:user:Krbkeytab
    properties:
      keytab: ZXdlY2VxcmVxd3Jld3E=
      ldapServer: ${trname2.name}
      principal: testprin
Copy

Create Krbkeytab Resource

Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

Constructor syntax

new Krbkeytab(name: string, args: KrbkeytabArgs, opts?: CustomResourceOptions);
@overload
def Krbkeytab(resource_name: str,
              args: KrbkeytabArgs,
              opts: Optional[ResourceOptions] = None)

@overload
def Krbkeytab(resource_name: str,
              opts: Optional[ResourceOptions] = None,
              keytab: Optional[str] = None,
              ldap_server: Optional[str] = None,
              principal: Optional[str] = None,
              name: Optional[str] = None,
              pac_data: Optional[str] = None,
              vdomparam: Optional[str] = None)
func NewKrbkeytab(ctx *Context, name string, args KrbkeytabArgs, opts ...ResourceOption) (*Krbkeytab, error)
public Krbkeytab(string name, KrbkeytabArgs args, CustomResourceOptions? opts = null)
public Krbkeytab(String name, KrbkeytabArgs args)
public Krbkeytab(String name, KrbkeytabArgs args, CustomResourceOptions options)
type: fortios:user:Krbkeytab
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.

Parameters

name This property is required. string
The unique name of the resource.
args This property is required. KrbkeytabArgs
The arguments to resource properties.
opts CustomResourceOptions
Bag of options to control resource's behavior.
resource_name This property is required. str
The unique name of the resource.
args This property is required. KrbkeytabArgs
The arguments to resource properties.
opts ResourceOptions
Bag of options to control resource's behavior.
ctx Context
Context object for the current deployment.
name This property is required. string
The unique name of the resource.
args This property is required. KrbkeytabArgs
The arguments to resource properties.
opts ResourceOption
Bag of options to control resource's behavior.
name This property is required. string
The unique name of the resource.
args This property is required. KrbkeytabArgs
The arguments to resource properties.
opts CustomResourceOptions
Bag of options to control resource's behavior.
name This property is required. String
The unique name of the resource.
args This property is required. KrbkeytabArgs
The arguments to resource properties.
options CustomResourceOptions
Bag of options to control resource's behavior.

Constructor example

The following reference example uses placeholder values for all input properties.

var krbkeytabResource = new Fortios.User.Krbkeytab("krbkeytabResource", new()
{
    Keytab = "string",
    LdapServer = "string",
    Principal = "string",
    Name = "string",
    PacData = "string",
    Vdomparam = "string",
});
Copy
example, err := user.NewKrbkeytab(ctx, "krbkeytabResource", &user.KrbkeytabArgs{
	Keytab:     pulumi.String("string"),
	LdapServer: pulumi.String("string"),
	Principal:  pulumi.String("string"),
	Name:       pulumi.String("string"),
	PacData:    pulumi.String("string"),
	Vdomparam:  pulumi.String("string"),
})
Copy
var krbkeytabResource = new Krbkeytab("krbkeytabResource", KrbkeytabArgs.builder()
    .keytab("string")
    .ldapServer("string")
    .principal("string")
    .name("string")
    .pacData("string")
    .vdomparam("string")
    .build());
Copy
krbkeytab_resource = fortios.user.Krbkeytab("krbkeytabResource",
    keytab="string",
    ldap_server="string",
    principal="string",
    name="string",
    pac_data="string",
    vdomparam="string")
Copy
const krbkeytabResource = new fortios.user.Krbkeytab("krbkeytabResource", {
    keytab: "string",
    ldapServer: "string",
    principal: "string",
    name: "string",
    pacData: "string",
    vdomparam: "string",
});
Copy
type: fortios:user:Krbkeytab
properties:
    keytab: string
    ldapServer: string
    name: string
    pacData: string
    principal: string
    vdomparam: string
Copy

Krbkeytab Resource Properties

To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

Inputs

In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

The Krbkeytab resource accepts the following input properties:

Keytab This property is required. string
base64 coded keytab file containing a pre-shared key.
LdapServer This property is required. string
LDAP server name.
Principal This property is required. string
Kerberos service principal, e.g. HTTP/fgt.example.com@EXAMPLE.COM.
Name Changes to this property will trigger replacement. string
Kerberos keytab entry name.
PacData string
Enable/disable parsing PAC data in the ticket. Valid values: enable, disable.
Vdomparam Changes to this property will trigger replacement. string
Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
Keytab This property is required. string
base64 coded keytab file containing a pre-shared key.
LdapServer This property is required. string
LDAP server name.
Principal This property is required. string
Kerberos service principal, e.g. HTTP/fgt.example.com@EXAMPLE.COM.
Name Changes to this property will trigger replacement. string
Kerberos keytab entry name.
PacData string
Enable/disable parsing PAC data in the ticket. Valid values: enable, disable.
Vdomparam Changes to this property will trigger replacement. string
Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
keytab This property is required. String
base64 coded keytab file containing a pre-shared key.
ldapServer This property is required. String
LDAP server name.
principal This property is required. String
Kerberos service principal, e.g. HTTP/fgt.example.com@EXAMPLE.COM.
name Changes to this property will trigger replacement. String
Kerberos keytab entry name.
pacData String
Enable/disable parsing PAC data in the ticket. Valid values: enable, disable.
vdomparam Changes to this property will trigger replacement. String
Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
keytab This property is required. string
base64 coded keytab file containing a pre-shared key.
ldapServer This property is required. string
LDAP server name.
principal This property is required. string
Kerberos service principal, e.g. HTTP/fgt.example.com@EXAMPLE.COM.
name Changes to this property will trigger replacement. string
Kerberos keytab entry name.
pacData string
Enable/disable parsing PAC data in the ticket. Valid values: enable, disable.
vdomparam Changes to this property will trigger replacement. string
Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
keytab This property is required. str
base64 coded keytab file containing a pre-shared key.
ldap_server This property is required. str
LDAP server name.
principal This property is required. str
Kerberos service principal, e.g. HTTP/fgt.example.com@EXAMPLE.COM.
name Changes to this property will trigger replacement. str
Kerberos keytab entry name.
pac_data str
Enable/disable parsing PAC data in the ticket. Valid values: enable, disable.
vdomparam Changes to this property will trigger replacement. str
Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
keytab This property is required. String
base64 coded keytab file containing a pre-shared key.
ldapServer This property is required. String
LDAP server name.
principal This property is required. String
Kerberos service principal, e.g. HTTP/fgt.example.com@EXAMPLE.COM.
name Changes to this property will trigger replacement. String
Kerberos keytab entry name.
pacData String
Enable/disable parsing PAC data in the ticket. Valid values: enable, disable.
vdomparam Changes to this property will trigger replacement. String
Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.

Outputs

All input properties are implicitly available as output properties. Additionally, the Krbkeytab resource produces the following output properties:

Id string
The provider-assigned unique ID for this managed resource.
Id string
The provider-assigned unique ID for this managed resource.
id String
The provider-assigned unique ID for this managed resource.
id string
The provider-assigned unique ID for this managed resource.
id str
The provider-assigned unique ID for this managed resource.
id String
The provider-assigned unique ID for this managed resource.

Look up Existing Krbkeytab Resource

Get an existing Krbkeytab resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

public static get(name: string, id: Input<ID>, state?: KrbkeytabState, opts?: CustomResourceOptions): Krbkeytab
@staticmethod
def get(resource_name: str,
        id: str,
        opts: Optional[ResourceOptions] = None,
        keytab: Optional[str] = None,
        ldap_server: Optional[str] = None,
        name: Optional[str] = None,
        pac_data: Optional[str] = None,
        principal: Optional[str] = None,
        vdomparam: Optional[str] = None) -> Krbkeytab
func GetKrbkeytab(ctx *Context, name string, id IDInput, state *KrbkeytabState, opts ...ResourceOption) (*Krbkeytab, error)
public static Krbkeytab Get(string name, Input<string> id, KrbkeytabState? state, CustomResourceOptions? opts = null)
public static Krbkeytab get(String name, Output<String> id, KrbkeytabState state, CustomResourceOptions options)
resources:  _:    type: fortios:user:Krbkeytab    get:      id: ${id}
name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
resource_name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
The following state arguments are supported:
Keytab string
base64 coded keytab file containing a pre-shared key.
LdapServer string
LDAP server name.
Name Changes to this property will trigger replacement. string
Kerberos keytab entry name.
PacData string
Enable/disable parsing PAC data in the ticket. Valid values: enable, disable.
Principal string
Kerberos service principal, e.g. HTTP/fgt.example.com@EXAMPLE.COM.
Vdomparam Changes to this property will trigger replacement. string
Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
Keytab string
base64 coded keytab file containing a pre-shared key.
LdapServer string
LDAP server name.
Name Changes to this property will trigger replacement. string
Kerberos keytab entry name.
PacData string
Enable/disable parsing PAC data in the ticket. Valid values: enable, disable.
Principal string
Kerberos service principal, e.g. HTTP/fgt.example.com@EXAMPLE.COM.
Vdomparam Changes to this property will trigger replacement. string
Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
keytab String
base64 coded keytab file containing a pre-shared key.
ldapServer String
LDAP server name.
name Changes to this property will trigger replacement. String
Kerberos keytab entry name.
pacData String
Enable/disable parsing PAC data in the ticket. Valid values: enable, disable.
principal String
Kerberos service principal, e.g. HTTP/fgt.example.com@EXAMPLE.COM.
vdomparam Changes to this property will trigger replacement. String
Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
keytab string
base64 coded keytab file containing a pre-shared key.
ldapServer string
LDAP server name.
name Changes to this property will trigger replacement. string
Kerberos keytab entry name.
pacData string
Enable/disable parsing PAC data in the ticket. Valid values: enable, disable.
principal string
Kerberos service principal, e.g. HTTP/fgt.example.com@EXAMPLE.COM.
vdomparam Changes to this property will trigger replacement. string
Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
keytab str
base64 coded keytab file containing a pre-shared key.
ldap_server str
LDAP server name.
name Changes to this property will trigger replacement. str
Kerberos keytab entry name.
pac_data str
Enable/disable parsing PAC data in the ticket. Valid values: enable, disable.
principal str
Kerberos service principal, e.g. HTTP/fgt.example.com@EXAMPLE.COM.
vdomparam Changes to this property will trigger replacement. str
Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
keytab String
base64 coded keytab file containing a pre-shared key.
ldapServer String
LDAP server name.
name Changes to this property will trigger replacement. String
Kerberos keytab entry name.
pacData String
Enable/disable parsing PAC data in the ticket. Valid values: enable, disable.
principal String
Kerberos service principal, e.g. HTTP/fgt.example.com@EXAMPLE.COM.
vdomparam Changes to this property will trigger replacement. String
Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.

Import

User KrbKeytab can be imported using any of these accepted formats:

$ pulumi import fortios:user/krbkeytab:Krbkeytab labelname {{name}}
Copy

If you do not want to import arguments of block:

$ export “FORTIOS_IMPORT_TABLE”=“false”

$ pulumi import fortios:user/krbkeytab:Krbkeytab labelname {{name}}
Copy

$ unset “FORTIOS_IMPORT_TABLE”

To learn more about importing existing cloud resources, see Importing resources.

Package Details

Repository
fortios pulumiverse/pulumi-fortios
License
Apache-2.0
Notes
This Pulumi package is based on the fortios Terraform Provider.