Skip to content

Latest commit

 

History

History
67 lines (50 loc) · 3.76 KB

File metadata and controls

67 lines (50 loc) · 3.76 KB

IAM assumable roles with SAML Identity Provider example

Configuration in this directory creates several IAM roles which can be assumed by users with a SAML Identity Provider.

Usage

To run this example you need to execute:

$ terraform init
$ terraform plan
$ terraform apply

Run terraform destroy when you don't need these resources.

Requirements

Name Version
terraform >= 1.0
aws >= 4.0

Providers

Name Version
aws >= 4.0

Modules

Name Source Version
iam_assumable_roles_with_saml ../../modules/iam-assumable-roles-with-saml n/a
iam_assumable_roles_with_saml_custom ../../modules/iam-assumable-roles-with-saml n/a
iam_assumable_roles_with_saml_second_provider ../../modules/iam-assumable-roles-with-saml n/a
iam_assumable_roles_with_saml_with_self_assume ../../modules/iam-assumable-roles-with-saml n/a

Resources

Name Type
aws_iam_saml_provider.idp_saml resource
aws_iam_saml_provider.second_idp_saml resource

Inputs

No inputs.

Outputs

Name Description
admin_iam_role_arn ARN of admin IAM role
admin_iam_role_name Name of admin IAM role
admin_iam_role_path Path of admin IAM role
admin_iam_role_unique_id Unique ID of IAM role
poweruser_iam_role_arn ARN of poweruser IAM role
poweruser_iam_role_name Name of poweruser IAM role
poweruser_iam_role_path Path of poweruser IAM role
poweruser_iam_role_unique_id Unique ID of IAM role
readonly_iam_role_arn ARN of readonly IAM role
readonly_iam_role_name Name of readonly IAM role
readonly_iam_role_path Path of readonly IAM role
readonly_iam_role_unique_id Unique ID of IAM role