ansible-roles/roles/radius_server/defaults/main.yml
2021-12-01 19:13:34 +01:00

49 lines
1.4 KiB
YAML

---
rad_clients: []
# rad_clients:
# - name: ap-wifi
# ip: 192.168.7.0/24
# secret: p@ssw0rd
# nas_type: other
rad_auth_port: 1812
rad_acc_port: 1813
rad_ports: [ "{{ rad_auth_port }}", "{{ rad_acc_port }}" ]
rad_src_ip: []
# An optional password if the private key is protected
# rad_tls_key_pass:
# The CA (full chain) to verify client's certificates
# rad_tls_ca: |
# ---- BEGIN CERTIFICATE ----
# ---- END CERTIFICATE ----
# The certificate of the radius server
# rad_tls_cert: |
# ---- BEGIN CERTIFICATE ----
# ---- END CERTIFICATE ----
# The private key of the radius server
# rad_tls_key: |
# -----BEGIN RSA PRIVATE KEY-----
# -----END RSA PRIVATE KEY-----
# An optional CRL to check client's certificate against
# Can either be a raw CRL in PEM format, or an http or https URL
# where to fetch it
# If undefined, no check will be performed, and revoked certificates will be accepted
# rad_tls_crl:
# An email address to notify in case of CRL issue.
# In case the CRL couldn't be fetched or is outdated, and rad_notify_crl is defined
# the validation script will allow the authentication and notify the adress instead of failing
# rad_notify_crl: admin@example.org
# The issuer of the clients certificate
# This can be usefull if you have several intermediate CA
# all signed by the same root CA, but only want to trust clients from
# one of them
# rad_tls_issuer: /C=FR/ST=Aquitaine/L=Bordeaux/O=Firewall Services/OU=Security/CN=wifi