|
5 anos atrás | |
---|---|---|
.. | ||
modules | 5 anos atrás | |
README.md | 5 anos atrás | |
account_alias.tf | 5 anos atrás | |
assume_role_policy-okta_saml.tf | 5 anos atrás | |
datasources.tf | 5 anos atrás | |
locals.tf | 5 anos atrás | |
policy-mdr_engineer.tf | 5 anos atrás | |
policy-mdr_iam_admin.tf | 5 anos atrás | |
policy-mdr_readonly_assumerole.tf | 5 anos atrás | |
policy-mdr_terraformer.tf | 5 anos atrás | |
role-mdr_engineer.tf | 5 anos atrás | |
role-mdr_engineer_readonly.tf | 5 anos atrás | |
role-mdr_iam_admin.tf | 5 anos atrás | |
role-mdr_terraformer.tf | 5 anos atrás | |
saml_provider.tf | 5 anos atrás | |
variables.tf | 5 anos atrás | |
versions.tf | 5 anos atrás |
Defines several well-known IAM roles and ties them to matching OKTA groups that are passed over as part of a SAML assertion.
Make sure you have an OKTA_API_TOKEN
enviornment variable set with
an Okta API token.
Name | Version |
---|---|
aws | ~2.0? |
okta | ? |
Name | Description | Type | Required |
---|---|---|---|
okta_app | The (friendly) name of the Okta app. In our environment either "AWS - Commercial" or "AWS - GovCloud" | string |
Yes |
account_alias | The account alias that should be set for the AWS account. This is an AWS global value | string |
yes |
trusted arns | Any ARNS that should be able to AssumeRole. This is mostly intended for use in "child" AWS accounts. | list(string) |
no |
Role Name | Attached Policies | Description |
---|---|---|
/user/mdr_engineer | mdr_engineer | "legacy" role. |
/user/mdr_engineer_readonly | ReadOnlyAccess mdr_engineer_readonly_assumerole |
Read only access to AWS console with ability to escalate to Terraformer role |
/user/mdr_iam_admin | IAMFullAccess iam_admin_kms |
"legacy" role. |
/user/mdr_terraformer | mdr_terraformer | Full read/write access to (almost) everything. Has some limitations around PassRole and AssumeRole |
Policy Name | Description |
---|---|
mdr_engineer | "legacy" policy. Gives effectively PowerUserAccess but with limitations on iam:PassRole and sts:AssumeRole. |
iam_admin_kms | "legacy" policy. Gives several kms:* actions related to creating, destroying, and managing keys. Encrypt and Decrypt are noticeably absent. |
mdr_engineer_readonly_assumerole | Read only access to AWS console with ability to escalate to Terraformer role |
mdr_terraformer | Full read/write access to (almost) everything. Has some limitations around PassRole and AssumeRole |