host_secret
Host account secret
metadata objectrequired
rotating password object
once host object saved, added by backend
Specify ID of access group, default access group will be used if ID is not specified. Access group will be checked for WinRM trust anchors if certificate validation option is set to enabled.
address of server
Possible values: [windows, linux]
Disable or enable password rotation certificate validation
Possible values: [DISABLED, ENABLED]
WinRM host certificate trust anchors in PEM format
rotate passwords of all accounts in host through one account
rotate passwords of all accounts in host through this account
if protocol winrm and main account set, this password is stored to vault-v2
password policy to be applied
script template to be run in host
When the object was created. Added by backend
2017-01-01T15:05:05ZWhen the object was updated. Added by backend
2017-01-01T15:05:05Zadded by backend
added by backend
accounts object[]
username
When last successful rotation. Added by backend
2017-01-01T15:05:05ZWhen last rotation error. Added by backend
2017-01-01T15:05:05ZLast rotation error details. Added by backend
initial password to store in vault to start rotation
{
"metadata": {
"host_id": "3fa85f64-5717-4562-b3fc-2c963f66afa6",
"access_group_id": "3fa85f64-5717-4562-b3fc-2c963f66afa6",
"address": "string",
"port": 0,
"operating_system": "windows",
"certificate_validation_options": "DISABLED",
"winrm_host_certificate_trust_anchors": "string",
"use_main_account": true,
"main_account": "string",
"winrm_main_account_password": "string",
"password_policy_id": "3fa85f64-5717-4562-b3fc-2c963f66afa6",
"script_template_id": "3fa85f64-5717-4562-b3fc-2c963f66afa6",
"created": "2017-01-01T15:05:05Z",
"updated": "2017-01-01T15:05:05Z",
"created_by": "string",
"updated_by": "string"
},
"accounts": [
{
"account": "string",
"last_rotated": "2017-01-01T15:05:05Z",
"last_error": "2017-01-01T15:05:05Z",
"last_error_details": "string",
"initial_password": "string"
}
]
}