Creates "standard" IAM policies and roles in an account being treated like an AWS organizations child account.
Picture our collection of AWS accounts with the "common-services" account being the root of an Organizations hierarchy, where all of the users exist there and AssumeRole to the correct role in the child account.
common-services
prod-c2
test-c2
prod-customer-1
prod-customer-2
...
This module makes roles that are NOT SAML linked. It is expected you will AssumeRole into these roles cross-account.
Name | Version |
---|---|
aws | ~2.0? |
Name | Description | Type | Required |
---|---|---|---|
okta_app | The (friendly) name of the Okta app. In our environment either "AWS - Commercial" or "AWS - GovCloud" | string |
Yes |
account_alias | The account alias that should be set for the AWS account. This is an AWS global value | string |
yes |
Role Name | Attached Policies | Description |
---|---|---|
/user/mdr_engineer_readonly | ReadOnlyAccess mdr_engineer_readonly_assumerole |
Read only access to AWS console with ability to escalate to Terraformer role |
/user/mdr_terraformer | mdr_terraformer | Full read/write access to (almost) everything. Has some limitations around PassRole and AssumeRole |
Module name | purpose |
---|---|
standard_iam_policies | defines the policies used by the roles |