-
Notifications
You must be signed in to change notification settings - Fork 53
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
2 changed files
with
66 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,53 @@ | ||
################################## | ||
# | ||
# settings for the Redirect plugin | ||
# (WS-Management forwarding) | ||
# | ||
# This module can proxy/forward/redirect requests to another WS-Management server | ||
# A typical scenario is Dell's "Integrated Dell Remote Access Controller" (iDRAC) | ||
# which acts as a baseboard management controller (out of band management) but has | ||
# it's own network configuration. | ||
# | ||
# The redirect plugin allows the host to forward WS-Management request to this | ||
# controller. For the client, in-band (talking to host) and out of band (talking | ||
# to iDrac) only differs in the resource URI. | ||
################################## | ||
|
||
# server to redirect to | ||
server='hostname-or-ip' | ||
# port for server | ||
port=443 | ||
|
||
# resource URI prefix, must be different from known prefixes | ||
resource='http://schemas.dell.com/wbem/wscim/1/cim-schema/2' | ||
|
||
# credentials for the remote server | ||
username='user' | ||
password='pass' | ||
authentication_method='basic' | ||
|
||
# path for SOAP requests | ||
url_path='/wsman' | ||
|
||
cim_namespace='root/cimv2' | ||
|
||
# empty: http, non-empty: https | ||
# | ||
# Pass a string naming a file holding one or more certificates to verify the peer with. | ||
# This makes sense only when used in combination with the noverifypeer=0 option | ||
# If noverifypeer=1, cacert need not even indicate an accessible file. | ||
cacert='dummy.pem' | ||
|
||
# if certificates need to be verified | ||
noverifypeer=1 | ||
noverifyhost=1 | ||
|
||
# File of the private key, in .pem format | ||
sslkey= | ||
|
||
# File of your certificate, in .pem format | ||
# With NSS or Secure Transport, this can also be the nickname of the certificate you wish | ||
# to authenticate with as it is named in the security database. | ||
# If you want to use a file from the current directory, please precede it with "./" prefix, | ||
# in order to avoid confusion with a nickname. | ||
cl_cert= |