Authority boundaries
The collection is credible only when every page is clear about who owns the state, who runs the workflow, and who enforces the result.
Boundary Table
| Authority | Owns | Does not own |
|---|---|---|
| IdM / FreeIPA | Identity, enrolled hosts, groups, vaults, Kerberos principals, IdM CA records, DNS, sudo, HBAC, SELinux maps, and user expiry attributes. | AAP job scheduling, Kubernetes runtime enforcement, private-key storage decisions, report remediation. |
redhat.rhel_idm and freeipa.ansible_freeipa |
IdM server, replica, and client lifecycle plus broad IdM object management. | The live-inventory, evidence, render-first, AAP, OpenShift, Kubernetes, reporting, or temporary-access workflows provided by eigenstate.ipa. |
eigenstate.ipa |
Ansible interfaces that read, render, validate, or explicitly mutate IdM-backed state. | The source truth itself, runtime cluster enforcement, or broad secret-manager semantics. |
| Ansible | Task execution, variables, check mode, module invocation, and task result handling. | Identity authority or long-term job evidence by itself. |
| AAP | Execution environments, job templates, scheduling, credentials, approvals, and job evidence. | IdM policy, Kerberos principal ownership, or cluster enforcement. |
| Kerberos tooling | Tickets and keytab retrieval under configured principal and host authority. | Authorization policy outside Kerberos and IdM. |
| IdM CA | Certificate issuance from CSRs and certificate retrieval/search. | Private key generation or protection. |
| Kubernetes and OpenShift | Runtime application of manifests, RBAC, Secret access, OAuth configuration, and cluster policy. | IdM state or Ansible report truth. |
| Reports | Evidence artifacts from supplied records and checks. | Enforcement or automatic remediation. |
Workflow Boundaries
Use these labels consistently:
read-only: query and return state without writing artifacts or remote staterender-only: write review artifacts without applying them to a live runtimepreflight: check prerequisites before a later workflow changes anythingcheck-mode: predict change through Ansible dry-run behaviormutating: change IdM, files, Controller, cluster, certificate, keytab, or vault state
Evidence Expectations
Every rewritten page should show or point to the artifact that proves the boundary:
- reference pages point to source docs or
ansible-doc - how-to pages show expected task output or artifacts
- tutorials show safe sample output
- explanation pages link to the surface that implements the boundary
What This Does Not Claim
The boundary language is not a guarantee that a site is secure. It is a documentation control. The actual safety still depends on IdM ACLs, Kerberos configuration, AAP credentials, Ansible variable handling, file permissions, cluster controls, and operator review.