-
Notifications
You must be signed in to change notification settings - Fork 9.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SSO: Support for permission boundary policies #25893
Comments
Related: #25904 |
Since #25904 is specific to customer managed policies, perhaps this issue can be updated so it is specific to only the permission boundary? |
I can do that @lorengordon . |
Let's discuss the code interface to add boundary policy. The parameters are found in this document. parameters{
"InstanceArn": "string",
"PermissionsBoundary": {
"CustomerManagedPolicyReference": {
"Name": "string",
"Path": "string"
},
"ManagedPolicyArn": "string"
},
"PermissionSetArn": "string"
} Suggested codeOne of data "aws_ssoadmin_instances" "example" {}
resource "aws_ssoadmin_permission_set" "example" {
name = "Example"
instance_arn = tolist(data.aws_ssoadmin_instances.example.arns)[0]
}
resource "aws_ssoadmin_permission_set_boundary_policy" "example" {
instance_arn = tolist(data.aws_ssoadmin_instances.example.arns)[0]
permission_set_arn = aws_ssoadmin_permission_set.example.arn
customer_managed_policy_name = "<policy_name>"
customer_managed_policy_path = "<policy_path>"
managed_policy_arn = "<policy_arn>"
} |
Perhaps having the interface to specify the boundary in a similar way that the AWS SSO API it's more consistent. The same was done in the ssoadmin_customer_managed_policy_attachment
or
I wonder how to conditionally go with one option or the other when creating modules using this resource |
This functionality has been released in v4.47.0 of the Terraform AWS Provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template. Thank you! |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Community Note
Description
https://aws.amazon.com/about-aws/whats-new/2022/07/aws-single-sign-on-aws-sso-aws-identity-access-management-iam-customer-managed-policies-cmps/ both just got released to AWS SSO. These improve the flexibility over the current inline policy + aws managed.
New or Affected Resource(s)
As it is, the inline and managed policy attachments are designed to attach to an existing permission set. So this addition shouldn't impact existing resources
Potential Terraform Configuration
I suppose the interface would be very similar to the current aws managed policy https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/ssoadmin_managed_policy_attachment
References
edit: changing this issue to be specific to permission boundary since there's another issue for CMPs
The text was updated successfully, but these errors were encountered: