Reporting Overview
The reporting roles produce read-only operational evidence from explicit records in inventory, Controller surveys, fixture files, or prior discovery jobs. They render deterministic artifacts that are safe to archive.
The reporting roles do not mutate IdM, AAP, OpenShift, Kubernetes, or adjacent systems. Any remediation belongs in a separate opt-in workflow.
Roles
| Role | Purpose |
|---|---|
idm_readiness_report |
Summarizes IdM automation readiness checks and recommendations. |
certificate_inventory_report |
Captures certificate metadata for renewal and lifecycle review. |
keytab_rotation_candidates |
Identifies principals that should be reviewed for keytab rotation without exposing keytab bytes. |
temporary_access_report |
Records temporary access windows, status, controls, and evidence. |
policy_drift_report |
Compares expected and observed policy records and reports drift findings. |
Output Formats
Every role supports:
- JSON for automation and scheduled comparison
- YAML for peer review
- Markdown for operator handoff
Each report includes:
schemaschema_versionrolegenerated_at_utcsitecontextread_onlysummary- role-specific record arrays
Use a fixed *_generated_at_utc value in CI when byte-for-byte deterministic
fixtures matter. Use an explicit timestamp from the surrounding job when the
report is archival evidence from a real run.
Safety Boundary
Reports must not include:
- private keys
- passwords
- API tokens
- keytab bytes
- Kubernetes Secret payloads
- IdM vault payload values
For remediation, schedule a separate playbook that reads the report and then applies an explicitly approved change plan.