In Ansible, playbooks perform automated tasks. You can reference the Futurex PKCS #11 library when performing these tasks inside the playbook file to perform various functions, including SSH and signing data.
Run the following commands to create an Ansible project working directory and switch to it:
Shell
sudo mkdir ~/ansible_projectcd ~/ansible_project
2
Run the following command to create an inventory file:
Shell
sudo nano inventory
The following shows an example inventory file using localhost:
Shell
[local]localhost ansible_connection=local
3
Run the following command to create a playbook.yml file:
Shell
sudo nano playbook.yml
The following shows an example Ansible playbook file for testing SSH referencing the private key created in the previous section (ansible_rsa_privatekey):
Shell
---- hosts: local vars: pkcs11_module: "/usr/local/bin/fxpkcs11/libfxpkcs11.so" pkcs11_pin: "safest" pkcs11_key_id: "ansible_rsa_privatekey" tasks: - name: Test connectivity command: echo "Hello, PKCS#11" - name: SSH to localhost using PKCS#11 command: ssh -I {{ pkcs11_module }} jtitus@localhost echo "SSH with PKCS#11" register: ssh_result - name: Show SSH result debug: var: ssh_result.stdout
Replace pkcs11module with the location of the Futurex PKCS #11 library on your system.
Replace pkcs11pin with the password you configured for the identity created for this integration.
Replace pkcs11keyid with the label of the key you set when creating the key pair via PKCS11-tool.
4
To execute the playbook and reference the private key stored on the HSM during the SSH connection, run the following command, setting the username, inventory, and playbook file information according to your setup:
When prompted for the BECOME password in Ansible, use the become directive to escalate privileges when running tasks, similar to using sudo in the command line. The become_password is the user password specified in become_user (which defaults to root if not specified).
6
When prompted, enter the password of the user you are connecting to the machine with through SSH.
After entering the password, the process completes. If successful, you see a response similar to the following:
The following steps demonstrate using Futurex PKCS #11 with Ansible to encrypt and sign data:
1
Run the following commands to create an Ansible project working directory and switch to it:
Shell
sudo mkdir ~/ansible_projectcd ~/ansible_project
2
Run the following command to create an inventory file:
Shell
sudo nano inventory
The following example shows an inventory file using localhost:
Shell
[local]localhost ansible_connection=local
3
Run the following command to create a playbook.yml file:
Shell
sudo nano playbook.yml
The following example shows an Ansible playbook file you can copy and use for encrypting data and signing data referencing the private key created in the previous section (ansible_rsa_privatekey):
Replace pkcs11\module with the location of the Futurex PKCS #11 library on your system.
Replace pkcs11\pin with the password you configured for the identity created for this integration.
Replace pkcs11\key\id with the label of the key you set when creating the key pair by using PKCS11-tool.
To execute the playbook and reference the private key stored on the HSM during the SSH connection, run the following command, setting the username, inventory, and playbook file information according to your setup:
When prompted for the BECOME password in Ansible, use the become directive to escalate privileges when running tasks, similar to using sudo in the command line. The become_password is the password for the user specified in become_user (which defaults to root if not specified).
If successful, you should see a response similar to the following:
Shell
PLAY [local] ***************************************************************************************************************************************************************************************TASK [Gathering Facts]**************************************************************************************************************************************************************************ok: [localhost]TASK [Encrypt data using PKCS#11] ***************************************************************************************************************************************************************changed: [localhost]TASK [Show encryption result]*******************************************************************************************************************************************************************ok: [localhost] => { "msg": "Data encrypted successfully"}TASK [Sign data using PKCS#11]******************************************************************************************************************************************************************changed: [localhost]TASK [Show signing result]**********************************************************************************************************************************************************************ok: [localhost] => { "msg": "Data signed successfully"}PLAY RECAP *****************************************************************************************************************************************************************************************localhost : ok=5 changed=2 unreachable=0 failed=0 skipped=0 rescued=0 ignored=0
6
You can verify the signing and encryption operations within the FXPKCS11 log file or by checking the contents of the output file.