isam

3Modules1Role39Plugins

Overview

Description

IBM Security Access Manager Ansible Collection

Readme

Ansible Collection - ibm.isam

Documentation for installing and using this collection.

Ansible Lint

Description

The ibm.isam collection provides Ansible modules, plugins and roles to configure IBM Verify Identity Access (formerly IBM Security Verify Access) appliances or containers. It depends on the ibmsecurity Python package .

The playbooks in the collection can be used as examples to create your own specific deployments of IBM Verify Identity Access using Ansible !

Requirements

  • ibmsecurity 2024.4.5 or higher (pip install ibmsecurity)
  • Ansible 2.15 or higher
  • Python v3.7 or higher

Installation

Before using this collection, you need to install it with the Ansible Galaxy command-line tool:

ansible-galaxy collection install ibm.isam

You can also include it in a requirements.yml file and install it with ansible-galaxy collection install -r requirements.yml, using the format:

collections:
  - name: ibm.isam

Note that if you install any collections from Ansible Galaxy, they will not be upgraded automatically when you upgrade the Ansible package. To upgrade the collection to the latest available version, run the following command:

ansible-galaxy collection install ibm.isam --upgrade

You can also install a specific version of the collection, for example, if you need to downgrade when something is broken in the latest version (please report an issue in this repository). Use the following syntax to install version 1.0.0:

ansible-galaxy collection install ibm.isam:==2.7.0

See using Ansible collections for more details.

Required variables for the collection

Use the following variables to allow for ISAM connections: * ansible_connection: ibm.isam.isam * ansible_isam_username * ansible_isam_password * ansible_isam_port * ansible_host -> this can be set to match inventory_hostname (necessary for recent versions of Ansible).

Example inventory file:

[primary]

192.168.198.100

[primary:vars]
ansible_host=192.168.198.100
ansible_connection="ibm.isam.isam"
ansible_isam_username="admin@local"
ansible_isam_password="admin"
ansible_isam_port="443"

Recommended variables

Additionally, you need to set the homedir variable to match your environment. The homedir variable defines the root path that will be searched for files. It defaults to inventory_dir, but a better value would be the empty string (''), to simply use the path as is from the variable, or to the root_playbook_dir variable.

homedir: "{{ root_playbook_dir }}"

The default for root_playbook_dir var is pointing to the Ansible magic variable playbook_dir.

Note that if you run playbooks from within this collection, the playbook_dir variable will point to the folder in the collection that contains the playbook. This is not desirable (probably), so the best way to handle this is to explicitly set the variable when starting your playbook, like in the example below.

- name: Prepare root_playbook_dir variable
  hosts: all
  gather_facts: false
  tasks:
    - name: Set root_playbook_dir fact
      ansible.builtin.set_fact:
        root_playbook_dir: "{{ playbook_dir | dirname }}"
        cacheable: yes
      tags:
        - always

Optional variables

Support for proxies (http and https) has been added.

ansible_https_proxy: "http://<proxyserver>:<port>"
ansible_http_proxy: "http://<proxyserver>:<port>"

It was already possible to use a proxy server for the Ansible CLI (ansible-playbook) by setting an environment variable before starting the playbook.

TLS

Using ibmsecurity v2024.4.5+ enables secure TLS connections between Ansible and the appliance's LMI (Management interface). This collection starts using that code in version 2.0.0.

The best solution is to get a signed certificate from a Certificate Authority that is trusted within your organization's default ca settings. In that case, simply setting validate_certs to True is sufficient.

ansible.cfg:

[isam]
validate_certs = True

You can also supply a specific CA:

ansible.cfg:

[isam]
validate_certs = True
verify_ca_path = /<path_to_pem>/isamAppliance.pem

You can retrieve the certificate of the LMI and store it to use as verify_ca_path

openssl s_client -connect ${HOSTNAME}:${PORT} </dev/null 2>/dev/null | openssl x509 -outform pem > isamAppliance.pem

You can override the standard setting (from ansible.cfg) using a variable `isam_validate_certs'. So for instance, to do the initial setup of your appliance, you could use

ansible-navigator run .... -e "isam_validate_certs=false"

To use the ibm.isam collection with execution environments, you may want to create a custom Execution Environment that includes the dependencies. However, the collection now includes a playbook that you can use to check if it works in your case with a standard Execution Environment (connectivity_check.yml)

Use Cases

Complete configuration

The base_site.yml playbook provides an example for basic appliance configuration.

Cluster configuration

The site.yml playbook provides an example for a clustered IVIA setup.

Testing

The collection is tested against IVIA appliances v11.0.0 and v10.0.8.

Support

As Red Hat Ansible Certified Content, this collection is entitled to support through the Ansible Automation Platform (AAP) using the Create issue button on the top right corner. If a support case cannot be opened with Red Hat and the collection has been obtained either from Galaxy or GitHub, issues can be alternatively be reported by opening an issue Issues in the isam-ansible-collection Github repository.

Release Notes and Roadmap

Changelog

Related Information

License Information

LICENCE

Certification

Product
Red Hat Ansible Automation Platform 2.4
Red Hat Ansible Automation Platform 2.5
DocumentationDependencies
No dependencies
There are currently no dependencies for this collection.
View in Automation Hub
Red Hat logoLinkedInYouTubeFacebookTwitter

Platforms

Products & services

Try, buy, sell

Help

About Red Hat Ecosystem Catalog

The Red Hat Ecosystem Catalog is the official source for discovering and learning more about the Red Hat Ecosystem of both Red Hat and certified third-party products and services.

We’re the world’s leading provider of enterprise open source solutions—including Linux, cloud, container, and Kubernetes. We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

© 2025 Red Hat