diff --git a/docsite/rst/intro_configuration.rst b/docsite/rst/intro_configuration.rst index 466e37fcbfe..60b89b7436c 100644 --- a/docsite/rst/intro_configuration.rst +++ b/docsite/rst/intro_configuration.rst @@ -115,6 +115,15 @@ sudoing. The default behavior is also no:: Users on platforms where sudo passwords are enabled should consider changing this setting. +.. _ask_vault_pass: + +ask_vault_pass +============== + +This controls whether an Ansible playbook should prompt for the vault password by default. The default behavior is no:: + + ask_vault_pass=True + .. _bin_ansible_callbacks: bin_ansible_callbacks diff --git a/docsite/rst/playbooks_vault.rst b/docsite/rst/playbooks_vault.rst index 5cb1eb90c9c..2a7b8190996 100644 --- a/docsite/rst/playbooks_vault.rst +++ b/docsite/rst/playbooks_vault.rst @@ -5,7 +5,7 @@ Vault New in Ansible 1.5, "Vault" is a feature of ansible that allows keeping sensitive data such as passwords or keys in encrypted files, rather than as plaintext in your playbooks or roles. These vault files can then be distributed or placed in source control. -To enable this feature, a command line tool, `ansible-vault` is used to edit files, and a command line flag `--ask-vault-pass` or `--vault-password-file` is used. Alternately, you may specify the location of a password file in your ansible.cfg file. This option requires no command line flag usage. +To enable this feature, a command line tool, `ansible-vault` is used to edit files, and a command line flag `--ask-vault-pass` or `--vault-password-file` is used. Alternately, you may specify the location of a password file or command Ansible to always prompt for the password in your ansible.cfg file. These options require no command line flag usage. .. _what_can_be_encrypted_with_vault: