Skip to content

Commit 6e22365

Browse files
author
netascode-gen
committed
Defaults updates
1 parent a2aa8f5 commit 6e22365

File tree

1 file changed

+24
-24
lines changed

1 file changed

+24
-24
lines changed

defaults/defaults.yaml

Lines changed: 24 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -1,26 +1,26 @@
11
defaults:
22
meraki:
3-
domains:
4-
- name: EMEA
5-
organizations:
6-
- name: Dev
7-
snmp:
8-
v2c_enabled: false
9-
v3_enabled: true
10-
login_security:
11-
enforce_password_expiration: true # Boolean indicating whether users are forced to change their password every X number of days.
12-
password_expiration_days: 30 # Number of days after which users will be forced to change their password.
13-
enforce_different_passwords: true # Boolean indicating whether users, when setting a new password, are forced to choose a new password that is different from any past passwords.
14-
num_different_passwords: 3 # Number of recent passwords that new password must be distinct from.
15-
enforce_strong_passwords: true # Boolean indicating whether users will be forced to choose strong passwords for their accounts. Strong passwords are at least 8 characters that contain 3 of the following: number, uppercase letter, lowercase letter, and symbol
16-
enforce_account_lockout: true # Boolean indicating whether users' Dashboard accounts will be locked out after a specified number of consecutive failed login attempts.
17-
account_lockout_attempts: 5 # Number of consecutive failed login attempts after which users' accounts will be locked.
18-
enforce_idle_timeout: true # Boolean indicating whether users will be logged out after being idle for the specified number of minutes.
19-
idle_timeout_minutes: 30 # Number of minutes users can remain idle before being logged out of their accounts.
20-
enforce_two_factor_auth: false # Boolean indicating whether users in this organization will be required to use an extra verification code when logging in to Dashboard. This code will be sent to their mobile phone via SMS, or can be generated by the authenticator application.
21-
enforce_login_ip_ranges: false # Boolean indicating whether organization will restrict access to Dashboard (including the API) from certain IP addresses.
22-
login_ip_ranges: [] # List of acceptable IP ranges. Entries can be single IP addresses, IP address ranges, and CIDR subnets.
23-
api_authentication:
24-
ip_restrictions_for_keys:
25-
enabled: false
26-
ranges: [] # List of acceptable IP ranges. Entries can be single IP addresses, IP address ranges, and CIDR subnets.
3+
domains:
4+
- name: EMEA
5+
organizations:
6+
- name: Dev
7+
snmp:
8+
v2c_enabled: false
9+
v3_enabled: true
10+
login_security:
11+
enforce_password_expiration: true # Boolean indicating whether users are forced to change their password every X number of days.
12+
password_expiration_days: 30 # Number of days after which users will be forced to change their password.
13+
enforce_different_passwords: true # Boolean indicating whether users, when setting a new password, are forced to choose a new password that is different from any past passwords.
14+
num_different_passwords: 3 # Number of recent passwords that new password must be distinct from.
15+
enforce_strong_passwords: true # Boolean indicating whether users will be forced to choose strong passwords for their accounts. Strong passwords are at least 8 characters that contain 3 of the following: number, uppercase letter, lowercase letter, and symbol
16+
enforce_account_lockout: true # Boolean indicating whether users' Dashboard accounts will be locked out after a specified number of consecutive failed login attempts.
17+
account_lockout_attempts: 5 # Number of consecutive failed login attempts after which users' accounts will be locked.
18+
enforce_idle_timeout: true # Boolean indicating whether users will be logged out after being idle for the specified number of minutes.
19+
idle_timeout_minutes: 30 # Number of minutes users can remain idle before being logged out of their accounts.
20+
enforce_two_factor_auth: false # Boolean indicating whether users in this organization will be required to use an extra verification code when logging in to Dashboard. This code will be sent to their mobile phone via SMS, or can be generated by the authenticator application.
21+
enforce_login_ip_ranges: false # Boolean indicating whether organization will restrict access to Dashboard (including the API) from certain IP addresses.
22+
login_ip_ranges: [] # List of acceptable IP ranges. Entries can be single IP addresses, IP address ranges, and CIDR subnets.
23+
api_authentication:
24+
ip_restrictions_for_keys:
25+
enabled: false
26+
ranges: [] # List of acceptable IP ranges. Entries can be single IP addresses, IP address ranges, and CIDR subnets.

0 commit comments

Comments
 (0)