Orientation

Choose the right tutorial, how-to, reference, or explanation page for the job.

Boundary
Read-only
Authority
idm, collection
Evidence
architecture-boundary

Start Here

Choose by the work you need to do, not by repository path.

I Need To Learn The Shape

Goal Page
See how IdM becomes inventory Build your first live IdM inventory
Retrieve sample vault material safely Retrieve your first IdM vault value
Build the AAP runtime image Build an AAP execution environment
Walk through service onboarding Onboard a service with principal, keytab, and certificate checks
Render review-first workload material Render a workload Secret from IdM material

I Need To Do A Production Task

Task Page
Target hosts from IdM Use IdM as live Ansible inventory
Retrieve vault material Retrieve an IdM vault secret
Manage vault lifecycle Manage IdM vault lifecycle
Preflight principals Query principal state
Retrieve or rotate keytabs Retrieve a keytab or Rotate a keytab explicitly
Request a certificate Request an IdM certificate
Test HBAC or inspect policy Test HBAC access, Inspect sudo policy, or Inspect SELinux map scope
Open temporary access Open a temporary access window
Render OpenShift or Kubernetes artifacts Render OpenShift identity evidence or Render a Kubernetes Secret from an IdM vault
Produce reports Generate operational evidence

I Need Exact Facts

Start with Reference. It routes to:

  • inventory plugin options and hostvars
  • lookup plugin terms, options, modes, and returns
  • module arguments, check mode, changed state, and return values
  • role variables and outputs
  • wrapper playbooks
  • authentication, return shapes, report schemas, support, and release process

I Need To Understand Boundaries

Question Page
What is the collection? What is eigenstate.ipa?
Which IdM collection should own which work? What is eigenstate.ipa?
Why read IdM as automation state? IdM as an automation state plane
Which system owns what? Authority boundaries
Where is the secret boundary? Secret boundary
What are keytab and certificate risks? Kerberos keytab boundary and Certificate boundary
What remains risky? Security threat model