Configuration in this directory creates IAM user with a random password, a pair of IAM access/secret keys and uploads IAM SSH public key.
User password and secret key is encrypted using public key of keybase.io user named test
.
To run this example you need to execute:
$ terraform init
$ terraform plan
$ terraform apply
Run terraform destroy
when you don't need these resources.
Name | Version |
---|---|
terraform | >= 1.0 |
aws | >= 4.0 |
Name | Version |
---|---|
aws | >= 4.0 |
Name | Source | Version |
---|---|---|
iam_user | ../../modules/iam-user | n/a |
iam_user2 | ../../modules/iam-user | n/a |
iam_user3 | ../../modules/iam-user | n/a |
iam_user4 | ../../modules/iam-user | n/a |
Name | Type |
---|---|
aws_iam_policy.example | data source |
No inputs.
Name | Description |
---|---|
iam_access_key_encrypted_secret | The encrypted secret, base64 encoded |
iam_access_key_id | The access key ID |
iam_access_key_key_fingerprint | The fingerprint of the PGP key used to encrypt the secret |
iam_access_key_secret | The access key secret |
iam_access_key_ses_smtp_password_v4 | The secret access key converted into an SES SMTP password |
iam_access_key_status | Active or Inactive. Keys are initially active, but can be made inactive by other means. |
iam_user_arn | The ARN assigned by AWS for this user |
iam_user_login_profile_encrypted_password | The encrypted password, base64 encoded |
iam_user_login_profile_key_fingerprint | The fingerprint of the PGP key used to encrypt the password |
iam_user_login_profile_password | The user password |
iam_user_name | The user's name |
iam_user_unique_id | The unique ID assigned by AWS |
keybase_password_decrypt_command | Decrypt user password command |
keybase_password_pgp_message | Encrypted password |
keybase_secret_key_decrypt_command | Decrypt access secret key command |
keybase_secret_key_pgp_message | Encrypted access secret key |
pgp_key | PGP key used to encrypt sensitive data for this user (if empty - secrets are not encrypted) |
policy_arns | The list of ARNs of policies directly assigned to the IAM user |