Start Here
Choose by the work you need to do, not by repository path.
I Need To Learn The Shape
| Goal | Page |
|---|---|
| See how IdM becomes inventory | Build your first live IdM inventory |
| Retrieve sample vault material safely | Retrieve your first IdM vault value |
| Build the AAP runtime image | Build an AAP execution environment |
| Walk through service onboarding | Onboard a service with principal, keytab, and certificate checks |
| Render review-first workload material | Render a workload Secret from IdM material |
I Need To Do A Production Task
| Task | Page |
|---|---|
| Target hosts from IdM | Use IdM as live Ansible inventory |
| Retrieve vault material | Retrieve an IdM vault secret |
| Manage vault lifecycle | Manage IdM vault lifecycle |
| Preflight principals | Query principal state |
| Retrieve or rotate keytabs | Retrieve a keytab or Rotate a keytab explicitly |
| Request a certificate | Request an IdM certificate |
| Test HBAC or inspect policy | Test HBAC access, Inspect sudo policy, or Inspect SELinux map scope |
| Open temporary access | Open a temporary access window |
| Render OpenShift or Kubernetes artifacts | Render OpenShift identity evidence or Render a Kubernetes Secret from an IdM vault |
| Produce reports | Generate operational evidence |
I Need Exact Facts
Start with Reference. It routes to:
- inventory plugin options and hostvars
- lookup plugin terms, options, modes, and returns
- module arguments, check mode, changed state, and return values
- role variables and outputs
- wrapper playbooks
- authentication, return shapes, report schemas, support, and release process
I Need To Understand Boundaries
| Question | Page |
|---|---|
| What is the collection? | What is eigenstate.ipa? |
| Which IdM collection should own which work? | What is eigenstate.ipa? |
| Why read IdM as automation state? | IdM as an automation state plane |
| Which system owns what? | Authority boundaries |
| Where is the secret boundary? | Secret boundary |
| What are keytab and certificate risks? | Kerberos keytab boundary and Certificate boundary |
| What remains risky? | Security threat model |