Configuration in this directory creates several IAM roles which can be assumed by users with a SAML Identity Provider.
To run this example you need to execute:
$ terraform init
$ terraform plan
$ terraform apply
Run terraform destroy
when you don't need these resources.
Name | Version |
---|---|
terraform | >= 1.0 |
aws | >= 4.0 |
Name | Version |
---|---|
aws | >= 4.0 |
Name | Source | Version |
---|---|---|
iam_assumable_roles_with_saml | ../../modules/iam-assumable-roles-with-saml | n/a |
iam_assumable_roles_with_saml_custom | ../../modules/iam-assumable-roles-with-saml | n/a |
iam_assumable_roles_with_saml_second_provider | ../../modules/iam-assumable-roles-with-saml | n/a |
iam_assumable_roles_with_saml_with_self_assume | ../../modules/iam-assumable-roles-with-saml | n/a |
Name | Type |
---|---|
aws_iam_saml_provider.idp_saml | resource |
aws_iam_saml_provider.second_idp_saml | resource |
No inputs.
Name | Description |
---|---|
admin_iam_role_arn | ARN of admin IAM role |
admin_iam_role_name | Name of admin IAM role |
admin_iam_role_path | Path of admin IAM role |
admin_iam_role_unique_id | Unique ID of IAM role |
poweruser_iam_role_arn | ARN of poweruser IAM role |
poweruser_iam_role_name | Name of poweruser IAM role |
poweruser_iam_role_path | Path of poweruser IAM role |
poweruser_iam_role_unique_id | Unique ID of IAM role |
readonly_iam_role_arn | ARN of readonly IAM role |
readonly_iam_role_name | Name of readonly IAM role |
readonly_iam_role_path | Path of readonly IAM role |
readonly_iam_role_unique_id | Unique ID of IAM role |