Skip to content

Commit

Permalink
Defaults updates
Browse files Browse the repository at this point in the history
  • Loading branch information
netascode-gen committed Jan 24, 2025
1 parent a2aa8f5 commit 6e22365
Showing 1 changed file with 24 additions and 24 deletions.
48 changes: 24 additions & 24 deletions defaults/defaults.yaml
Original file line number Diff line number Diff line change
@@ -1,26 +1,26 @@
defaults:
meraki:
domains:
- name: EMEA
organizations:
- name: Dev
snmp:
v2c_enabled: false
v3_enabled: true
login_security:
enforce_password_expiration: true # Boolean indicating whether users are forced to change their password every X number of days.
password_expiration_days: 30 # Number of days after which users will be forced to change their password.
enforce_different_passwords: true # Boolean indicating whether users, when setting a new password, are forced to choose a new password that is different from any past passwords.
num_different_passwords: 3 # Number of recent passwords that new password must be distinct from.
enforce_strong_passwords: true # Boolean indicating whether users will be forced to choose strong passwords for their accounts. Strong passwords are at least 8 characters that contain 3 of the following: number, uppercase letter, lowercase letter, and symbol
enforce_account_lockout: true # Boolean indicating whether users' Dashboard accounts will be locked out after a specified number of consecutive failed login attempts.
account_lockout_attempts: 5 # Number of consecutive failed login attempts after which users' accounts will be locked.
enforce_idle_timeout: true # Boolean indicating whether users will be logged out after being idle for the specified number of minutes.
idle_timeout_minutes: 30 # Number of minutes users can remain idle before being logged out of their accounts.
enforce_two_factor_auth: false # Boolean indicating whether users in this organization will be required to use an extra verification code when logging in to Dashboard. This code will be sent to their mobile phone via SMS, or can be generated by the authenticator application.
enforce_login_ip_ranges: false # Boolean indicating whether organization will restrict access to Dashboard (including the API) from certain IP addresses.
login_ip_ranges: [] # List of acceptable IP ranges. Entries can be single IP addresses, IP address ranges, and CIDR subnets.
api_authentication:
ip_restrictions_for_keys:
enabled: false
ranges: [] # List of acceptable IP ranges. Entries can be single IP addresses, IP address ranges, and CIDR subnets.
domains:
- name: EMEA
organizations:
- name: Dev
snmp:
v2c_enabled: false
v3_enabled: true
login_security:
enforce_password_expiration: true # Boolean indicating whether users are forced to change their password every X number of days.
password_expiration_days: 30 # Number of days after which users will be forced to change their password.
enforce_different_passwords: true # Boolean indicating whether users, when setting a new password, are forced to choose a new password that is different from any past passwords.
num_different_passwords: 3 # Number of recent passwords that new password must be distinct from.
enforce_strong_passwords: true # Boolean indicating whether users will be forced to choose strong passwords for their accounts. Strong passwords are at least 8 characters that contain 3 of the following: number, uppercase letter, lowercase letter, and symbol
enforce_account_lockout: true # Boolean indicating whether users' Dashboard accounts will be locked out after a specified number of consecutive failed login attempts.
account_lockout_attempts: 5 # Number of consecutive failed login attempts after which users' accounts will be locked.
enforce_idle_timeout: true # Boolean indicating whether users will be logged out after being idle for the specified number of minutes.
idle_timeout_minutes: 30 # Number of minutes users can remain idle before being logged out of their accounts.
enforce_two_factor_auth: false # Boolean indicating whether users in this organization will be required to use an extra verification code when logging in to Dashboard. This code will be sent to their mobile phone via SMS, or can be generated by the authenticator application.
enforce_login_ip_ranges: false # Boolean indicating whether organization will restrict access to Dashboard (including the API) from certain IP addresses.
login_ip_ranges: [] # List of acceptable IP ranges. Entries can be single IP addresses, IP address ranges, and CIDR subnets.
api_authentication:
ip_restrictions_for_keys:
enabled: false
ranges: [] # List of acceptable IP ranges. Entries can be single IP addresses, IP address ranges, and CIDR subnets.

0 comments on commit 6e22365

Please sign in to comment.