diff --git a/tasks/configure-iptables-externalusers.yml b/tasks/configure-iptables-externalusers.yml
index 4c70d65caab65f6c188111a39d19c4e2f2bf8425..3cd72e929bb5be5b56de684d3f303840dd729ec8 100644
--- a/tasks/configure-iptables-externalusers.yml
+++ b/tasks/configure-iptables-externalusers.yml
@@ -18,4 +18,3 @@
   loop: "{{ vault_iptables | flatten(levels=1) }}"
   notify:
     - save iptables rules
-  tags: [iptables]
diff --git a/tasks/configure-sftp-server.yml b/tasks/configure-sftp-server.yml
index 875775ce6c8430872bcd26ed9c81104029bd4780..a04639eeffedf72c834c7f19122e269a4620eaf8 100644
--- a/tasks/configure-sftp-server.yml
+++ b/tasks/configure-sftp-server.yml
@@ -8,7 +8,6 @@
     state: present
   notify:
     - restart sshd
-  tags: [sftp]
 
 - name: Konfiguration fuer SFTP-Server einspielen
   block:
@@ -30,7 +29,6 @@
       register: externalFTP
       notify:
         - restart sshd
-      tags: [sftp]
 
     # http://sysadmin.circularvale.com/server-config/setting-a-umask-for-chrooted-sftp-users/
     - name: Konfiguration fuer SFTP-Server einspielen (2/3)
@@ -40,7 +38,6 @@
         backup: "yes"
       notify:
         - restart sshd
-      tags: [sftp]
 
     - name: Mountpoints fuer SFTP konfigurieren (3/3)
       block:
@@ -51,7 +48,6 @@
             owner: "root"
             group: "root"
             mode: "0755"
-          tags: [sftp]
         - name: Uploadverzeichnis konfigurieren
           file:
             path: "/home/{{vault_sftp_user}}/reports/"
@@ -59,8 +55,6 @@
             owner: "{{vault_sftp_user}}"
             group: "{{vault_sftp_user}}"
             mode: "0770"
-          tags: [sftp]
-  tags: [sftp]
 
 - name: Konfiguration fuer Default-SFTP-Server einspielen
   blockinfile:
@@ -74,4 +68,3 @@
   when: not externalFTP
   notify:
     - restart sshd
-  tags: [sftp]
diff --git a/tasks/configure-ssh-publickeys.yml b/tasks/configure-ssh-publickeys.yml
index 5fe8eaf11b1f3bb862d05c291c29cb8695aba920..5c89ce23bfef0cc776e5f291eb67e8ff2cc9958a 100644
--- a/tasks/configure-ssh-publickeys.yml
+++ b/tasks/configure-ssh-publickeys.yml
@@ -7,4 +7,3 @@
     key: "{{ item.key }}"
     state: "{{ item.state | default('present') }}"
   loop: "{{ vault_authorized_keys | flatten(levels=1) }}"
-  tags: [ssh]
diff --git a/tasks/create-users-groups.yml b/tasks/create-users-groups.yml
index 7d3ecac9830afbc57aeb5d03a075253592e0cd1c..07039330590ddbb9d83c9e7c38988ff16939fbb2 100644
--- a/tasks/create-users-groups.yml
+++ b/tasks/create-users-groups.yml
@@ -10,7 +10,6 @@
 #      msg: "{{ item }}END"
 #      verbosity: 1
 #    with_dict: "{{ users }}"
-#    tags: [ users ]
 
 - name: create groups
   group:
@@ -18,7 +17,6 @@
     gid: "{{ item.gid }}"
     state: "{{ item.state | default('present') }}"
   loop: "{{ vault_groups | flatten(levels=1) }}"
-  tags: [users]
 
 # do NOT run this before skel configuration has been rolled out!
 #  - name: create individual primary user group
@@ -27,7 +25,6 @@
 #      state: present
 #      gid: "{{ item.value.uid }}"
 #    with_dict: "{{ users }}"
-#    tags: [ users ]
 
 - name: create users
   user:
@@ -44,7 +41,6 @@
     uid: "{{ item.value.uid | default(omit) }}"
     update_password: "on_create"
   with_dict: "{{ vault_users }}"
-  tags: [users]
 
 - name: overwrite defective vimrc. skel files
   copy:
@@ -52,4 +48,3 @@
     dest: "/home/{{ item.key }}/.vimrc"
     remote_src: "yes"
   with_dict: "{{ vault_users }}"
-  tags: [users]