|
3 роки тому | |
---|---|---|
.. | ||
modules | 3 роки тому | |
README.md | 5 роки тому | |
account_alias.tf | 5 роки тому | |
assume_role_policy-non_saml.tf | 3 роки тому | |
assume_role_policy-okta_saml.tf | 5 роки тому | |
datasources.tf | 5 роки тому | |
locals.tf | 5 роки тому | |
module-policies.tf | 5 роки тому | |
role-mdr_developer.tf | 3 роки тому | |
role-mdr_developer_readonly.tf | 5 роки тому | |
role-mdr_engineer_readonly.tf | 5 роки тому | |
role-mdr_feedmgmt_readonly.tf | 3 роки тому | |
role-mdr_terraformer.tf | 3 роки тому | |
saml_provider.tf | 5 роки тому | |
variables.tf | 3 роки тому | |
versions.tf | 3 роки тому |
Creates "standard" IAM policies and roles in an account being treated like an AWS organizations hierarchy root.
Picture our collection of AWS accounts with the "common-services" account being the root of an Organizations hierarchy, where all of the users exist there and AssumeRole to the correct role in the child account
common-services
prod-c2
test-c2
prod-customer-1
prod-customer-2
...
This module makes one SAML-linked role mdr_engineer_readonly
that we
access via OKTA. From there you AssumeRole into mdr_terraformer
to make
changes - either in this account or in others. Or, you AssumeRole into
mdr_engineer_readonly
in the other accounts for "just browsing".
Make sure you have an OKTA_API_TOKEN
enviornment variable set with
an Okta API token.
Name | Version |
---|---|
aws | ~2.0? |
okta | ? |
Name | Description | Type | Required |
---|---|---|---|
okta_app | The (friendly) name of the Okta app. In our environment either "AWS - Commercial" or "AWS - GovCloud" | string |
Yes |
account_alias | The account alias that should be set for the AWS account. This is an AWS global value | string |
yes |
Role Name | Attached Policies | Description |
---|---|---|
/user/mdr_engineer_readonly | ReadOnlyAccess mdr_engineer_readonly_assumerole |
Read only access to AWS console with ability to escalate to Terraformer role |
/user/mdr_terraformer | mdr_terraformer | Full read/write access to (almost) everything. Has some limitations around PassRole and AssumeRole |
Module name | purpose |
---|---|
standard_iam_policies | defines the policies used by the roles |
saml_linked_role | submodule that defines the okta group and role |