Commit 3b4f3f8c by Joshua Lund

Improved the documentation for password generation

parent c8bd1492
...@@ -215,9 +215,19 @@ Ansible 1.4 will also make remote environment variables available via facts in t ...@@ -215,9 +215,19 @@ Ansible 1.4 will also make remote environment variables available via facts in t
How do I generate crypted passwords for the user module? How do I generate crypted passwords for the user module?
++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Crypted password values can be generated as follows:: The mkpasswd utility that is available on most Linux systems is a great option::
openssl passwd -salt <salt> -1 <plaintext> mkpasswd --method=SHA-512
If this utility is not installed on your system (e.g. you are using OS X) then you can still easily
generate these passwords using Python. First, ensure that the `Passlib <https://code.google.com/p/passlib/>`_
password hashing library is installed.
pip install passlib
Once the library is ready, SHA512 password values can then be generated as follows::
python -c "from passlib.hash import sha512_crypt; print sha512_crypt.encrypt('<password>')"
.. _commercial_support: .. _commercial_support:
......
...@@ -77,8 +77,8 @@ options: ...@@ -77,8 +77,8 @@ options:
description: description:
- Optionally set the user's password to this crypted value. See - Optionally set the user's password to this crypted value. See
the user example in the github examples directory for what this looks the user example in the github examples directory for what this looks
like in a playbook. like in a playbook. The `FAQ <http://docs.ansible.com/faq.html#how-do-i-generate-crypted-passwords-for-the-user-module>`_
- Passwords values can be generated with "openssl passwd -salt <salt> -1 <plaintext>" contains details on various ways to generate these password values.
state: state:
required: false required: false
default: "present" default: "present"
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment