Configuration in this directory creates several individual IAM roles which can be assumed from a defined list of IAM ARNs.
The main difference between iam-assumable-role
and iam-assumable-roles
examples is that the former creates just a single role.
To run this example you need to execute:
$ terraform init
$ terraform plan
$ terraform apply
Run terraform destroy
when you don't need these resources.
Name | Version |
---|---|
terraform | >= 1.0 |
aws | >= 4.0 |
Name | Version |
---|---|
aws | >= 4.0 |
Name | Source | Version |
---|---|---|
iam_assumable_role_admin | ../../modules/iam-assumable-role | n/a |
iam_assumable_role_custom | ../../modules/iam-assumable-role | n/a |
iam_assumable_role_custom_trust_policy | ../../modules/iam-assumable-role | n/a |
iam_assumable_role_inline_policy | ../../modules/iam-assumable-role | n/a |
iam_assumable_role_sts | ../../modules/iam-assumable-role | n/a |
iam_policy | ../../modules/iam-policy | n/a |
Name | Type |
---|---|
aws_iam_policy_document.custom_trust_policy | data source |
No inputs.
Name | Description |
---|---|
iam_instance_profile_id | IAM Instance profile's ID. |
iam_role_arn | ARN of IAM role |
iam_role_name | Name of IAM role |
iam_role_path | Path of IAM role |
iam_role_unique_id | Unique ID of IAM role |
role_requires_mfa | Whether admin IAM role requires MFA |