You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Install SAML.to as an IAM Provider to an AWS Account.
Usage
Option 1: Use the Generated Trust Policy
# Creates a SAML Provider in AWS for SAML.tomodule"saml_to_iam" {
source="saml-to/iam/aws"owner="a_github_user_or_organization"
}
# Create a role which trusts SAML.toresource"aws_iam_role""my_role" {
name="my_role"assume_role_policy=module.saml_to_iam.trust_policy
}
Option 2: Generate a Custom Trust Policy
# Creates a SAML Provider in AWS for SAML.tomodule"saml_to_iam" {
source="saml-to/iam/aws"owner="a_github_user_or_organization"
}
# Create a Trust Policydata"aws_iam_policy_document""saml_to_trust" {
statement {
actions=module.saml_to_iam.trust_actionseffect="Allow"principals {
identifiers=module.saml_to_iam.trust_principal_identifierstype=module.saml_to_iam.trust_principal_type
}
condition {
test=module.saml_to_iam.trust_condition_saml_testvariable=module.saml_to_iam.trust_condition_saml_variablevalues=module.saml_to_iam.trust_condition_saml_values
}
}
}
# Create a role which trusts SAML.toresource"aws_iam_role""my_role" {
name="my_role"assume_role_policy=data.aws_iam_policy_document.saml_to_trust.json
}
A map of values for an IAM Trust Relationship containing the following keys: trust_actions, trust_principal_identifiers, trust_principal_type, trust_condition_saml_test, trust_condition_saml_variable, and trust_condition_saml_values