iam
cytopia/iam/aws
This Terraform module manages AWS IAM to its full extend.
Terraform module: AWS IAM Features | Important | Examples | Usage | Inputs | Outputs | Related projects | Authors | License      This Terraform module manages AWS IAM to its full extend. It is only required to have a single module invocation per AWS account, as this module allows the creation of unlimited resources and you will therefore have an auditable single source of truth for IAM. :star: Features Completely configurable via terraform.tfvars only Ar
| Name | Type | Description | Default |
|---|---|---|---|
| policies | list(object({ name = strin | A list of dictionaries defining all policies. | [] |
| users | list(object({ name = str | A list of dictionaries defining all users. | [] |
| policy_desc | string | The default description of the policy. | "Managed by Terraform" |
| tags | map(any) | Key-value mapping of tags for the IAM role or user. | {} |
| account_alias | string | Assign the account alias for the AWS Account. Unmanaged by default. Resource wil | "" |
| providers_oidc | list(object({ url | A list of dictionaries defining openid connect providers. | [] |
| roles | list(object({ name | A list of dictionaries defining all roles. | [] |
| role_path | string | The path under which to create the role. You can use a single path, or nest mult | "/" |
| role_desc | string | The description of the role. | "Managed by Terraform" |
| role_force_detach_policies | string | Specifies to force detaching any policies the role has before destroying it. | true |
| user_path | string | The path under which to create the user. You can use a single path, or nest mult | "/" |
| role_max_session_duration | string | The maximum session duration (in seconds) that you want to set for the specified | "3600" |
| account_pass_policy | object({ manage | Manages Password Policy for the AWS Account. Unmanaged by default. Resource will | {
"allow_users_to_change_password": nu |
| providers_saml | list(object({ name = strin | A list of dictionaries defining saml providers. | [] |
| groups | list(object({ name | A list of dictionaries defining all groups. | [] |
| policy_path | string | The default path under which to create the policy if not specified in the polici | "/" |
| group_path | string | The path under which to create the group. You can use a single path, or nest mul | "/" |
providers_saml — Created SAML providers.user_policy_arn_attachments — Attached user IAM policy arnsdebug_var_groups — The defined groups listdebug_local_user_policy_arns — The transformed user policy arns mapdebug_local_role_policy_arns — The transformed role policy arns mapaccount_alias — Created Account alias.roles — Created IAM rolesdebug_var_roles — The defined roles listdebug_local_user_policies — The transformed user policy mapdebug_local_role_policies — The transformed role policy mapuser_policy_attachments — Attached user customer managed IAM policiesrole_policy_attachments — Attached role customer managed IAM policiesrole_policy_arn_attachments — Attached role IAM policy arnsdebug_var_policies — The transformed policy mapdebug_local_group_policy_arns — The transformed group policy arns mapaccount_pass_policy — Created Account password policy.group_policy_arn_attachments — Attached group IAM policy arnsdebug_local_role_inline_policies — The transformed role inline policy mapgroups — Created IAM groupsusers — Created IAM usersdebug_var_users — The defined users listproviders_oidc — Created OpenID Connect providers.policies — Created customer managed IAM policiesgroup_policy_attachments — Attached group customer managed IAM policiesuser_inline_policy_attachments — Attached user inline IAM policiesdebug_local_group_inline_policies — The transformed group inline policy mapdebug_local_user_access_keys — The transformed user access key mapuser_group_memberships — Assigned user/group membershipsrole_inline_policy_attachments — Attached role inline IAM policiesdebug_local_policies — The transformed policy mapAzure landing zones Terraform module
Terraform supermodule for the Terraform platform engineering for Azure
Terraform module to deploy landing zone subscriptions (and much more) in Azure
Terraform Module to define a consistent naming convention by (namespace, stage,