Displaying 1 to 20 from 101 results

ansible-os-hardening - This Ansible role provides numerous security-related configurations, providing all-round base protection

  •    Ruby

This role provides numerous security-related configurations, providing all-round base protection. It is intended to be compliant with the DevSec Linux Baseline. If you're using inspec to test your machines after applying this role, please make sure to add the connecting user to the os_ignore_users-variable. Otherwise inspec will fail. For more information, see issue #124.

ansible-role-jenkins - Ansible Role - Jenkins CI

  •    Groovy

Installs Jenkins CI on RHEL/CentOS and Debian/Ubuntu servers. Requires curl to be installed on the server. Also, newer versions of Jenkins require Java 8+ (see the test playbooks inside the tests/ directory for an example of how to use newer versions of Java for your OS).

ansible-role-mysql - Ansible Role - MySQL

  •    Shell

Installs and configures MySQL or MariaDB server on RHEL/CentOS or Debian/Ubuntu servers. The home directory inside which Python MySQL settings will be stored, which Ansible will use when connecting to MySQL. This should be the home directory of the user which runs this Ansible role. The mysql_user_name and mysql_user_password can be set if you are running this role under a non-root user account and want to set a non-root user.

ansible-role-nginx - Ansible Role - Nginx

  •    

Installs Nginx on RedHat/CentOS, Debian/Ubuntu, Archlinux, FreeBSD or OpenBSD servers. This role installs and configures the latest version of Nginx from the Nginx yum repository (on RedHat-based systems), apt (on Debian-based systems), pacman (Archlinux), pkgng (on FreeBSD systems) or pkg_add (on OpenBSD systems). You will likely need to do extra setup work after this role has installed Nginx, like adding your own [virtualhost].conf file inside /etc/nginx/conf.d/, describing the location and options to use for your particular website.




ansible-role-php - Ansible Role - PHP

  •    Shell

Installs PHP on RedHat/CentOS and Debian/Ubuntu servers. If you're using an older LTS release of Ubuntu or RHEL, with an old/outdated version of PHP, you need to use a repo or PPA with a maintained PHP version, as this role only works with PHP versions that are currently supported by the PHP community.

ansible-ssh-hardening - This Ansible role provides numerous security-related ssh configurations, providing all-round base protection

  •    Ruby

This role provides secure ssh-client and ssh-server configurations. It is intended to be compliant with the DevSec SSH Baseline. Warning: This role disables root-login on the target server! Please make sure you have another user with su or sudo permissions that can login into the server.

Jazz

  •    

Jazz is a compact, modular framework that allows new, or existing, applications to easily employ roles, states, ACLs and void safety. Jazz provides security by allowing objects, and their methods and properties, to have their visibility and accessibility controlled, on a per ...


SecuritySpace

  •    

Role-Based Access Control for Applications ranged from Standalone to Multi-tier. Also contain : Permission management. Support for multi-database types.

SPRoleAssignment

  •    

SPRoleAssignment makes it easier for programmers to assign custom item level permissions. You can now easily grant or remove permissions to certain list items for users and groups. It's developed in C#.

Web Based Web Site Administration Tool (WSAT)

  •    ASPNET

This project allows the functionality of Microsoft's built in Web Site Administration Tool (WSAT) to be accessed from a regular old web page. This separates the need for Visual Studio to administer your web site. The Web Based WSAT tool allows you to create/manage users and roles

ASP.NET Tiny Security Providers

  •    ASPNET

A pack of tiny (XML, Compact SQL etc) ASP.NET Membership, Role and Profile providers.

ansible-role-apache - Ansible Role - Apache 2.x.

  •    

An Ansible Role that installs Apache 2.x on RHEL/CentOS, Debian/Ubuntu, SLES and Solaris. If you are using SSL/TLS, you will need to provide your own certificate and key files. You can generate a self-signed certificate with a command like openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout example.key -out example.crt.

sl-ember-behavior - An Ember CLI Addon that provides the ability to define and enforce behaviors, combining the concepts of whether a user has permission to perform an action and whether that action can currently be performed

  •    Javascript

We use https://waffle.io/softlayer/sl-ember-behavior to work our issues.An Ember CLI Addon that provides the ability to define and enforce behaviors, combining the concepts of whether a user has permission to perform an action and whether that action can currently be performed.

connect-acl - Simple ACL for Connect/Express

  •    Javascript

Simple ACL for Connect/Express. connect-acl can work only with Roles and Permissions.

ansible-role-ssh-chroot-jail - Ansible Role - SSH chroot jail config

  •    

Configures a chroot jail specifically for the purpose of limiting a set of SSH users to the jail. Useful if you have a server where you need to allow very limited access to a very limited amount of functionality. Requires OpenSSH server. Doesn't require geerlingguy.security, but that role (or one like it) is highly recommended to help lock down your server as much as possible.

ansible-role-github-users - Ansible Role - GitHub Users

  •    

Create users based on GitHub accounts. This role will take a GitHub username and create a system account with the same username, and will add all the pubkeys associated with the GitHub account to the user's authorized_keys.