how to add an authorized user chase

OK, I made some tweak on your playbook, and here is the revised version

Some changes note:

  • On authorized_key module, the key was changed to item.stdout . The stdout was public key that you need.
  • On authorized_key module, I defined ignore_errors: yes to resume playbook execution whenever the your curl task failed to fetch, either internet problem or 404 Not found (like tmessins's key). Of course you can tweak it by controlling what defines failure so it still failed when other error happened.

How to add an authorized user chase

As of Ansible 1.9, the value for key can be a url, obviating the need for curling the url via the shell module.


Chase United MileagePlus Explorer Cardmember Benefits

Get the most out of your MileagePlus ®

How to add an authorized user chase How to add an authorized user chase

Earn miles. Get away sooner.

Use Award Miles >

Save up to $100 per roundtrip. The primary Cardmember and one companion traveling on the same reservation will each receive their first standard checked bag free ($25 value for the first checked bag, each way, per person) on United-operated flights when the primary Cardmember includes their MileagePlus® number in their reservation and purchases their tickets from United with their Card. For complete details, please visit united.com/ChaseBag .

The primary Cardmember and companions on the same reservation will be invited to board United-operated flights prior to general boarding. To receive priority boarding, include your MileagePlus number with your reservation and refer to your United boarding pass for your boarding group number.

Take some time to relax before your flight with two United Club one-time passes each year for your Cardmember anniversary. Enjoy complimentary beverages, snacks, and amenities like workspaces, free Wi-Fi and more. Passes are not valid for use at United Arrivals Lounge, United Global First SM Lounge, United Polaris SM lounge or Star Alliance® lounge locations. For a list of United Club locations, visit united.com/UnitedClubLocations . Access is subject to availability.

Purchases made with your Explorer Card outside the U.S. will not be subject to foreign transaction fees.

Earn 2 miles per $1 spent on airline tickets purchased from United, and 1 mile per $1 spent on all other purchases.

The primary Cardmember who is also a MileagePlus Premier member and traveling on an award ticket can take advantage of Complimentary Premier Upgrades on eligible United-operated flights (when available). For complete details, please visit united.com/upgrades .

You can use MileagePlus miles for travel on United and other Star Alliance member airlines. Or use them to enhance your travel with upgrades, inflight Wi-Fi, hotel stays and car rentals. Miles can also be used for merchandise, gift cards and once-in-a-lifetime events. To learn more, please visit united.com/UseMiles .

If your trip is cancelled or cut short by sickness, severe weather, and other covered situations, you can be reimbursed up to $10,000 per trip for your pre-paid, non-refundable travel expenses, including passenger fares, tours, and hotels.**

Reimburses you for essential purchases like toiletries and clothing for baggage delays over 6 hours by passenger carrier up to $100 a day for 3 days.**

If you or an immediate family member check or carry on luggage that is damaged or lost by the carrier, you're covered up to $3,000 per passenger.**

If your common carrier travel is delayed more than 12 hours or requires an overnight stay, you and your family are covered for unreimbursed expenses, such as meals and lodging, up to $500 per ticket.**

Decline the rental company's collision insurance and charge the entire rental cost to your Card. Coverage is primary and provides reimbursement up to the actual cash value of the vehicle for theft and collision damage for most rental cars in the U.S. and abroad.**

Covers your new purchases for 120 days against damage or theft up to $10,000 per claim and $50,000 per year.**

If a Card purchase you made in the U.S. is advertised for less in print or online within 90 days, you can be reimbursed the difference up to $500 per item and $2,500 per year.**

You can be reimbursed for eligible items that the store won't take back within 90 days of purchase, up to $500 per item, $1,000 per year.**

Extends the time period of the U.S. manufacturer's warranty by an additional year, on eligible warranties of three years or less.**

** These benefits are available when you use your Card. Restrictions, limitations and exclusions apply. Most benefits are underwritten by unaffiliated insurance companies who are solely responsible for the administration and claims. There are specific time limits and documentation requirements. Once your account is opened we will send you a Guide to Benefits, which includes a full explanation of coverages.

This exceptional group of over 900 properties includes many of the world's most exquisite hotels, resorts, lodges and spas, each of which extend you complimentary Cardmember Benefits with every stay. Make a reservation using your Chase Card to receive the following benefits including:

  • Daily breakfast for two
  • A special benefit unique to each property, such as a dining or spa credit
  • Complimentary in room Wi-Fi
  • A room upgrade, if available
  • Early check-in and late checkout, if available

Please visit LHRCollection.com for more information.

Pursue more of your passions. As a Cardmember you will be delighted with opportunities to purchase private, curated once-in-a-lifetime experiences. Sample select wines and satisfy your palate with culinary events at some of the world's best restaurants, meet a sporting legend or make memories with your family. You'll revel in the chance to explore pleasures old and new with experiential events offered exclusively for Cardmembers. Please visit InsideAccess.com to learn more.

Get complimentary Visa Signature® Concierge Service 24 hours a day. Find tickets to the top sports and entertainment events, make dinner reservations and even get help sending the perfect gift.

Chase United MileagePlus Explorer Card offer details

Scroll down to see offer details

This is a link to a third-party site as described in our Weblinking Practices. Note that the third party's privacy policy and security practices may differ from Chase's standards. Chase assumes no responsibility for nor does it control, endorse or guarantee any aspect of your use of the linked site.

1-800-537-7783

  • Chase Customer Service Outside the U.S.

    1-847-888-6600 (Call Collect)

  • United Airlines Reservations

    1-800-241-6522

  • MileagePlus Customer Service


    How to Transfer Miles and Points to Family and Friends

    Have you ever wanted to transfer points or miles to another person? Maybe a family or friend needs a few extra miles to get an award ticket. Or perhaps you want to send points to a relative so they can buy a ticket to visit you. What are the restrictions on transferring points to other people, and how strictly are they enforced?

    Let’s take a look at the rules for some of the biggest rewards programs and find out what options you have.

    A few years back, you could easily transfer points between Membership Rewards accounts, or to someone else’s frequent flyer account if the airline was a partner with Amex. There were technically some restrictions, but Amex didn’t really enforce them.

    However, American Express cracked down on unauthorized transfers back in 2014, in part because people were buying and selling points. Now you can’t transfer between MR accounts at all, but you can transfer points to a frequent flyer account in your spouse’s name or that of an authorized user.

    The good news is that it’s easy to add authorized users to most Membership Rewards cards. You can do it online or by calling the number on the back of your card. This is usually free, but some cards, such as the Platinum card, charge extra to add users. It’s best to read the fine print or call and ask. Obviously you only want to add people you trust to your credit card account.

    How to add an authorized user chase

    Note that in order to transfer to your spouse, you have to have the same address registered with Amex.

    Chase’s rules for transferring points differ from Amex. You can transfer your Ultimate Rewards points to another UR account as long as the account holder is also a member of your household and shares the same address. But, if you want to transfer your points to someone else’s loyalty program account, like United MileagePlus, they have to also be an authorized user.

    The rules are similar for Chase business cards, like Ink Plus. Ultimate Rewards points can be transferred to other UR accounts if the account holder is a member of your household or a company employee. In order to transfer to another person’s frequent flyer account, though, they have to be an employee and an authorized card user. For some reason, household members are excluded.


    How to: Use Username Authentication with Transport Security in WCF Calling from Windows Forms

    This how-to article walks you through the process of using username authentication with transport security to authenticate your users against a Microsoft SQL Server® membership provider and optionally authorize users with the SQL Server role provider. The article shows you how to configure the membership provider and the role provider, create a custom HTTP module for authenticating users against the membership provider, and create a class that derives from IauthorizationPolicy so that WCF can authorize users.

    Username authentication is suited for scenarios in which your users do not have Microsoft Windows® credentials. In the scenario described in this How To article, users and roles are stored in SQL Server. Users are authenticated in ASP.NET against the SQL Server membership provider and optionally are authorized in the WCF service against the SQL Server role provider. The WCF service uses the basicHttpBinding binding type to provide compatibility with ASMX clients. Because transport security does not support username authentication, a custom HTTP module will be created for authentication, and the authentication type will be set to “None” in the WCF service.

    To use the SQL Server membership provider and role provider, you will first create a user and role store and then populate it with your users and roles. You will then configure the store to allow access to the WCF service process, in order to authenticate and authorize the users. Finally, you must configure IIS and WCF security settings to allow users to be authenticated and authorized correctly in ASP.NET and the WCF service.

    • Step 1: Create a User Store for the SQL Server Membership Provider and a Role Store for the SQL Server Role Provider
    • Step 2: Grant Access Permission to the WCF Service Process
    • Step 3: Create a Sample WCF Service
    • Step 4: Configure basicHttpBinding with Transport Security and an Authentication Type of “None”
    • Step 5: Configure the WCF Service for ASP.NET Compatibility Mode
    • Step 6: Configure the SQL Server Membership Provider in the Web Configuration File
    • Step 7: Configure the SQL Server Role Provider and Enable It in WCF
    • Step 8: Create the User and Assign Roles
    • Step 9: Implement a Custom HTTP Module Class That Derives from IHttpModule to Authenticate Users with the SQL Server Membership Provider
    • Step 10: Configure the WCF Service to Use the HTTP Module for Authentication
    • Step 11: Implement a Class that Derives from IAuthorizationPolicy
    • Step 12: Configure the WCF Service to Use the Authorization Policy
    • Step 13: Configure Security Settings in IIS
    • Step 14: Implement Authorization Checks on Your Service
    • Step 15: Create a Test Client
    • Step 16: Add a WCF Service Reference and Web Service Reference to the Client
    • Step 17: Test the WCF/ASMX Client and WCF Service

    Step 1: Create a User Store for the SQL Server Membership Provider and a Role Store for the SQL Server Role Provider

    The SQL Server membership provider stores user information, and the SQL Server role provider stores role information, in a SQL Server database. The user and role information work independently and can be created in different SQL Server databases. For the purposes of this example, both will be created in the same database. You can create your SQL Server user and role store manually by using the Aspnet_regsql.exe command from the command line.

    • From a Microsoft Visual Studio® 2008 command prompt, run the following command:

    In this command:

    • -S specifies the database server, which is (.\SQLExpress) in this example.
    • -E specifies to use Windows authentication to connect to SQL Server.
    • -A m —A r specifies to add the membership and the role features.

    For a complete list of the commands, run Aspnet_regsql /?

    Step 2: Grant Access Permission to the WCF Service Process

    In this step, you grant the WCF service process identity access to the Aspnetdb database. If you host the WCF service in Internet Information Services (IIS) 6.0 on Microsoft Windows Server 2003, the NT AUTHORITY\Network Service account is used by default to run the WCF service.

    1. Create a SQL Server login for NT AUTHORITY\Network Service.
    2. Grant the login access to the Aspnetdb database by creating a database user.
    3. Add the user to the aspnet_Membership_FullAccess database role.
    4. Add the user to the aspnet_Roles_FullAccess database role.

    You can perform these steps by using the SQL Server Management Studio, or you can run the following script in SQL Query Analyzer:

    If you do not have Management Studio or Query Analyzer, you can download Microsoft SQL Server Management Studio Express (SSMSE).

    In this step, you create a WCF service in Visual Studio.

    1. In Visual Studio, on the File menu, click New Web Site.
    2. In the Templates section, select WCF Service. Make sure that the Location is set to Http and specify the virtual directory to be created in the Path (e.g., https://localhost/WCFTestService).
    3. In the New Web Site dialog box, click OK to create a virtual directory and a sample WCF service.
    4. Change the service metadata to be published via HTTPS instead of HTTP. Double-click the Web.config file, scroll down to service metadata, and change the entry <serviceMetadata httpGetEnabled="true"/> to <serviceMetadata httpsGetEnabled="true"/>.

    Step 4: Configure basicHttpBinding with Transport Security and an Authentication Type of “None”

    In this step, you configure the WCF service to use transport security and an authentication type of “none.”

    1. In the Solution Explorer, right-click the Web.config file of the WCF service and then click Edit WCF Configuration.

    If you do not see the Edit WCF Configuration option, click the Tools menu and then click WCF Service Configuration Editor. Close the WCF Service Configuration Editor tool that appears. The option should now appear on the web.config context menu.

    By default, the name field will be empty because it is an optional attribute.

    By default, the name field will be empty because it is an optional attribute.

    Authentication will be done by the HTTP module in ASP.NET.

    This associates the binding configuration setting with the binding.

    Step 5: Configure the WCF Service for ASP.NET Compatibility Mode

    In this step, you configure the WCF service for ASP.NET compatibility mode. This is required because authentication is done by the HTTP module and you must be able to get the principal and the identity from the HTTP context in order to authorize users either imperatively or declaratively in WCF.

    1. Right-click the Service.svc file and then click View Code.
    2. Add the following using statement to the list of other using statements:

    public class Service : IService

    Step 6: Configure the SQL Server Membership Provider in the Web Configuration File

    In this step, you configure the SQL Server membership provider in the Web Configuration file.

    1. In the Web.config file, replace the existing single <connectionStrings/9gt; element with the following to point to your SQL Server membership provider database:

    Note that the use of the <clear/9gt; element prevents the default provider from being loaded and then never used. Make sure that the connection string name points to your previous connection string setting.

    Step 7: Configure the SQL Server Role Provider and Enable It in WCF

    In this step, you configure the use of the SQL Server role provider in the Web.configfile and enable it in your WCF service.

    1. Add a <roleManager9gt; element inside the <system.web9gt; element as shown in the following example.

    Note the use of the <clear/9gt; element, which prevents the default provider from being loaded and never used.

    If you do not see the Edit WCF Configuration option, select WCF Service Configuration Editor on the Tools menu. Close the WCF Service Configuration Editor tool that appears. The option should now appear on the web.config context menu.

    In this step, you create the user and assign a newly created role by using the ASP.NET Web Site Configuration Tool.

    1. In the Solution Explorer, select the WCF service project, and then on the Website menu, select ASP.NET Configuration.
    2. On the ASP.NET Web Site Administration Tool page, click the Security tab, and then click the Select authentication type link.
    3. On the page that appears, select the From the internet radio button and then click Done.
    4. Click the Create user link.
    5. On the Create User page, enter the details of the user you want to create in the SQL Server store, and then click Create User.

    If successful, a new user will be created.

    If successful, a new role will be created.

    Step 9: Implement a Custom HTTP Module Class That Derives from IHttpModule to Authenticate Users with the SQL Server Membership Provider

    In this step, you implement a custom HTTP module to authenticate users by using the SQL Server membership provider. You will create a Windows class library that will derive from IHttpModule.

    1. Open a new instance of Visual Studio, leaving your WCF service solution open.
    2. In the new instance of Visual Studio, click File, click New, and then click Project.
    3. Expand Visual C#, click Windows, and then select Class Library.
    4. In the Name field, enter UserAuthenticator and then click OK.
    5. In the Solution Explorer, right-click References, click Add Reference, select the .NET tab, select System.Web, and then click OK.
    6. Copy and paste the code below inside the Class1.cs file. This class has the following characteristics:
      1. It subscribes to the event handlers Authenticate Request, which will execute when the request starts to authenticate the user, and End Request, which will execute when Authenticate Request has finished.
      2. It checks for the authorization header. If it is not present, it sends a response back to the client with the header “WWW-Authenticate” to challenge the client to send credentials. If it is present, it extracts the username and credentials from the header and authenticates them against the SQL Server membership provider.
      3. If authentication fails, it returns status 401 to flag authentication failure. If authentication succeeds, it builds the generic principal and assigns it to the HTTP application context current user, to be used for later WCF authorization.
    7. Build the class solution.

      Step 10: Configure the WCF Service to Use the HTTP Module for Authentication

      In this step, you configure the WCF service to use the HTTP module for authentication.

      1. Right-click Web site and then click Add Reference. Select the Browse tab, navigate to the directory containing the UserNameAuthenticator.dll file, select the file, and then click OK.
      2. Configure the HTTP module in Web.Config. Open Web.Config in the Visual Studio editor and locate the httpModules node. If there is one, add the authentication module only as shown below. If it is not present, create an httpModules entry with the authentication module as shown below:

      Step 11: Implement a Class that Derives from IAuthorizationPolicy

      In this step, you implement a class that derives from IAuthorizationPolicy, which will assign the principal to the thread current principal and the identity to the WCF context. This will allow declarative authorization and retrieval of the caller's identity from the WCF security context.

      1. Open a new instance of Visual Studio, leaving your WCF service solution open.
      2. In the new instance of Visual Studio, click File, click New, and then click Project.
      3. Expand Visual C#, click Windows, and then select Class Library.
      4. In the Name field, enter AuthorizationPolicy and then click OK.
      5. In the Solution Explorer, right-click References and then click Add Reference. Select the .NET tab, select System.Web, select System.IdentityModel,System.IdentityModel.Selectors, and then click OK.
      6. Copy and paste the code below inside the Class1.cs file.

      This class has the following characteristics:

      1. It implements Evaluate method, which retrieves the principal from Httpcontext and assigns it to the evaluation context of WCF, so that WCF can do declarative authorization checks.
      2. It implements Evaluate, which retrieves the identity from Httpcontext and assigns it to the evaluation context of WCF, so that WCF can retrieve the identity of the caller from the WCF security context; otherwise, it will not be available and you will need to get the identity from HttpContext.
    8. Build the class solution.

      Step 12: Configure the WCF Service to Use the Authorization Policy

      In this step, you configure the WCF service to use the authorization policy.

      1. Right-click Web site and then click Add Reference. Select the Browse tab, navigate to the directory containing the AuthorizationPolicy.dll file, and then click OK.
      2. Right-click the Web.config file of the WCF service and then click Edit WCF Configuration.

      If you do not see the Edit WCF Configuration option, select WCF Service Configuration Editor on the Tools menu. Close the WCF Service Configuration Editor tool that appears. The option should now appear on the web.config context menu.

      The configuration file should now include the following configuration:

      In this step, you configure the Web site in IIS to use Secure Sockets Layer (SSL) encryption and anonymous security. You will need to have created a certificate for SSL security. To create a temporary certificate for SSL, see How to: Create and Install Temporary Certificates in WCF for Transport Security During Development.

      1. Click Start and then click Run.
      2. In the Run dialog box, type inetmgr and then click OK.
      3. In the Internet Information Services (IIS) Manager dialog box, expand the (local computer) node, and then expand the Web Sites node.
      4. Right-click Default Web Site and then click Properties.
      5. In the Default Web Site Properties dialog box, click the Directory Security tab, and then in the Secure Communications section, click Server Certificate.
      6. On the Welcome screen of the Web Server Certificate Wizard, click Next to continue.
      7. On the Server Certificate screen, select the Assign an existing certificate radio button option, and then click Next.
      8. On the Available Certificates screen, select the certificate you created and installed, and then click Next.
      9. Expand the Default Web Site node, right-click the virtual directory on your WCF service Web site, and then click Properties.
      10. In the Web site properties dialog box, click the Directory Security tab, and then in the Anonymous access and authentication control section, click Edit. Select only the Enable Anonymous Access option. Clear the other options.
      11. In the WCF service project, double-click the Web.config file and set Authentication to None.

      The following XML fragment contains the example: