Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support IAM permission boundaries #5174

Closed
copumpkin opened this issue Jul 12, 2018 · 9 comments
Closed

Support IAM permission boundaries #5174

copumpkin opened this issue Jul 12, 2018 · 9 comments
Labels
enhancement Requests to existing resources that expand the functionality or scope. service/iam Issues and PRs that pertain to the iam service.
Milestone

Comments

@copumpkin
Copy link

copumpkin commented Jul 12, 2018

Community Note

  • Please vote on this issue by adding a 👍 reaction to the original issue to help the community and maintainers prioritize this request
  • Please do not leave "+1" or "me too" comments, they generate extra noise for issue followers and do not help prioritize the request
  • If you are interested in working on this issue or have submitted a pull request, please leave a comment

Description

AWS just released IAM permission boundaries, a very cool new feature that allows us to let IAM principals do stuff with IAM without granting them effective admin powers.

Read more here.

New or Affected Resource(s)

  • aws_iam_user
  • aws_iam_role

Potential Terraform Configuration

It would likely just be another optional attribute on each of those resources to specify a managed policy ARN representing the permissions boundary.

References

@bflad
Copy link
Contributor

bflad commented Jul 13, 2018

Pull requests submitted:

@copumpkin
Copy link
Author

Beautiful, thanks!

@copumpkin
Copy link
Author

Looks like all the PRs are merged, and I think will all be in by 1.30. Thanks again for all the work 😄

@bflad bflad added this to the v1.30.0 milestone Jul 30, 2018
@bflad
Copy link
Contributor

bflad commented Jul 30, 2018

Indeed! All support will be in version 1.30.0 of the AWS provider, releasing middle of this week. 👍

@bflad
Copy link
Contributor

bflad commented Aug 2, 2018

These have all been released in version 1.30.0 of the AWS provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading.

@nusnewob
Copy link

nusnewob commented Sep 6, 2018

Doesn't seem to support multiple permission boundary policies, any plan to support it?

@lorengordon
Copy link
Contributor

@nusnewob Can you explain more what you mean? Looks to me like the AWS implementation supports a single policy as the permission boundary, and you can only attach one permission boundary on a role or user.

@ramphort
Copy link

ramphort commented Nov 21, 2019

@lorengordon I think he means writting stuff like this

resource "aws_iam_policy_attachment" "test" {
name = "test"
users = ["${var.profile_username}"]
policy_arn = "${aws_iam_policy.policy.arn}"
boundary_policy_arn = "${aws_iam_policy.policy_boundary.arn}"
}

But yet, we cannot add a boundary_policy_arn field

UPDATE

My bad, we can do this only on creation

resource "aws_iam_user" "lb" {
user = "${aws_iam_user.lb.name}"
permissions_boundary = "${aws_iam_policy.policy.arn}"
}

@ghost
Copy link

ghost commented Nov 21, 2019

I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.

If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. Thanks!

@ghost ghost locked and limited conversation to collaborators Nov 21, 2019
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
enhancement Requests to existing resources that expand the functionality or scope. service/iam Issues and PRs that pertain to the iam service.
Projects
None yet
Development

No branches or pull requests

5 participants