zscaler.ziacloud.zia_file_type_control_rules module – Adds a new File Type Control policy rule.
Note
This module is part of the zscaler.ziacloud collection (version 2.0.3).
It is not included in ansible-core
.
To check whether it is installed, run ansible-galaxy collection list
.
To install it, use: ansible-galaxy collection install zscaler.ziacloud
.
You need further requirements to be able to use this module,
see Requirements for details.
To use it in a playbook, specify: zscaler.ziacloud.zia_file_type_control_rules
.
New in zscaler.ziacloud 2.0.0
Synopsis
Adds a new File Type Control policy rule.
Requirements
The below requirements are needed on the host that executes this module.
Zscaler SDK Python can be obtained from PyPI https://pypi.org/project/zscaler-sdk-python/
Parameters
Parameter |
Comments |
---|---|
Flag to check whether a file has active content or not Choices:
|
|
A string that contains the obfuscated API key. |
|
Indicates whether packet capture (PCAP) is enabled or not Choices:
|
|
The client ID for OAuth2 authentication. |
|
The client secret for OAuth2 authentication. |
|
The Zscaler cloud name provisioned for your organization. Choices:
|
|
The list of cloud applications to which the File Type Control policy rule must be applied Use the info resource zia_cloud_applications_info to retrieve the list of supported app_policy and ssl_policy applications |
|
Name-ID pairs of departments for which rule will be applied |
|
Additional information about the rule |
|
Name-ID pairs of device groups for which the rule must be applied. This field is applicable for devices that are managed using Zscaler Client Connector. If no value is set, this field is ignored during the policy evaluation. |
|
List of device trust levels for which the rule must be applied. This field is applicable for devices that are managed using Zscaler Client Connector. The trust levels are assigned to the devices based on your posture configurations. If no value is set, this field is ignored during the policy evaluation. Choices:
|
|
Name-ID pairs of devices for which rule must be applied. Specifies devices that are managed using Zscaler Client Connector. If no value is set, this field is ignored during the policy evaluation. |
|
Determines whether the file type control rule is enabled or disabled Choices:
|
|
List of URL categories for which rule must be applied Choices:
|
|
Action taken when traffic matches policy. This field is not applicable to the Lite API. Choices:
|
|
Name-ID pairs of groups for which rule must be applied |
|
System generated identifier for a file-type policy |
|
The file type control rule label. Rule labels allow you to logically group your organization policy rules. Policy rules that are not associated with a rule label are grouped under the Untagged label. |
|
Name-ID pairs of the location groups to which the rule must be applied. |
|
Name-ID pairs of locations for which rule must be applied |
|
Maximum file size (in KB) used for evaluation of the FTP rule |
|
The minimum file size (in KB) used for evaluation of the DLP policy rule. |
|
Name of the file type control rule |
|
File operation performed. This field is not applicable to the Lite API. Choices:
|
|
Rule order number of the file type control rule |
|
A string that contains the password for the API admin. |
|
The private key for JWT-based OAuth2 authentication. |
|
Protocol criteria Choices:
|
|
A dict containing authentication credentials. |
|
Obfuscated API key. |
|
OAuth2 client ID. |
|
OAuth2 client secret. |
|
Zscaler cloud name. Choices:
|
|
Password for the API admin. |
|
Private key for OAuth2 JWT. |
|
Sandbox Cloud environment. |
|
Sandbox API Key. |
|
Whether to use the legacy Zscaler API client. Choices:
|
|
Email ID of the API admin. |
|
Vanity domain for OAuth2. |
|
Admin rank of the admin who creates this rule Default: |
|
The Sandbox cloud environment for API access. |
|
A string that contains the Sandbox API Key. |
|
Action must be set to CAUTION Size quota in MB beyond which the file type control rule is applied. The allowed range is between 10 MB and 100000 MB If not set, no quota is enforced. If a policy rule action is set to BLOCK, this field is not applicable. |
|
Specifies the desired state of the resource. Choices:
|
|
Action must be set to CAUTION Time quota in minutes, after which the file type control rule is applied. The allowed range is between 15 minutes and 600 minutes. If not set, no quota is enforced. If a policy rule action is set to BLOCK, this field is not applicable. |
|
Name-ID pairs of time interval during which rule must be enforced. |
|
Flag to check whether a file is unscannable or not Choices:
|
|
The URL categories to which the rule applies Use the info resource zia_url_categories_info to retrieve the category names. |
|
Whether to use the legacy Zscaler API client. Choices:
|
|
A string that contains the email ID of the API admin. |
|
Name-ID pairs of users for which rule must be applied |
|
The vanity domain provisioned by Zscaler for OAuth2 flows. |
|
The list of ZPA Application Segments for which this rule is applicable. This field is applicable only for the ZPA forwarding method. |
|
Indicates the external ID. Applicable only when this reference is of an external entity. |
|
The name of the Application Segment |
Notes
Note
Check mode is supported.
Examples
- name: Create/Update/Delete a file type control rule.
zscaler.ziacloud.zia_url_filtering_rules:
provider: '{{ provider }}'
name: "URL_Ansible_Example"
description: "URL_Ansible_Example"
enabled: "ENABLED"
action: "ALLOW"
order: 1
protocols:
- "HTTPS_RULE"
- "HTTP_RULE"
request_methods:
- "CONNECT"
- "DELETE"
- "GET"
- "HEAD"
- "OPTIONS"
- "OTHER"
- "POST"
- "PUT"
- "TRACE"