@@ -15,14 +15,59 @@ resource "aws_ssoadmin_permission_set" "department" {
1515 tags = var. tags
1616}
1717
18- resource "aws_ssoadmin_permission_set_inline_policy " "department " {
18+ resource "aws_ssoadmin_managed_policy_attachment " "department_s3 " {
1919 count = local. deploy_sso ? 1 : 0
2020
2121 provider = aws. aws_hackit_account
2222
23- inline_policy = var. environment == " stg" ? data. aws_iam_policy_document . sso_staging_user_policy . json : data. aws_iam_policy_document . sso_production_user_policy . json
2423 instance_arn = var. sso_instance_arn
2524 permission_set_arn = aws_ssoadmin_permission_set. department [0 ]. arn
25+ managed_policy_arn = var. environment == " stg" ? aws_iam_policy. s3_access . arn : aws_iam_policy. read_only_s3_access . arn
26+ }
27+
28+ resource "aws_ssoadmin_managed_policy_attachment" "department_glue" {
29+ count = local. deploy_sso ? 1 : 0
30+
31+ provider = aws. aws_hackit_account
32+
33+ instance_arn = var. sso_instance_arn
34+ permission_set_arn = aws_ssoadmin_permission_set. department [0 ]. arn
35+ managed_policy_arn = var. environment == " stg" ? aws_iam_policy. glue_access . arn : aws_iam_policy. read_only_glue_access . arn
36+ }
37+
38+ resource "aws_ssoadmin_managed_policy_attachment" "department_secrets" {
39+ count = local. deploy_sso ? 1 : 0
40+
41+ provider = aws. aws_hackit_account
42+
43+ instance_arn = var. sso_instance_arn
44+ permission_set_arn = aws_ssoadmin_permission_set. department [0 ]. arn
45+ managed_policy_arn = aws_iam_policy. secrets_manager_read_only . arn
46+ }
47+
48+ resource "aws_iam_policy" "sso_department_additional_policy" {
49+ count = local. deploy_sso ? 1 : 0
50+
51+ name = lower (" ${ var . identifier_prefix } -${ local . department_identifier } -sso-additional-policy" )
52+ description = " Additional SSO policy for ${ local . department_identifier } department in ${ var . environment } environment"
53+ policy = var. environment == " stg" ? (
54+ local. create_notebook ?
55+ data. aws_iam_policy_document . sso_staging_additional_with_notebook [0 ]. json :
56+ data. aws_iam_policy_document . sso_staging_additional [0 ]. json
57+ ) : (
58+ data. aws_iam_policy_document . sso_production_additional . json
59+ )
60+ tags = var. tags
61+ }
62+
63+ resource "aws_ssoadmin_managed_policy_attachment" "department_additional" {
64+ count = local. deploy_sso ? 1 : 0
65+
66+ provider = aws. aws_hackit_account
67+
68+ instance_arn = var. sso_instance_arn
69+ permission_set_arn = aws_ssoadmin_permission_set. department [0 ]. arn
70+ managed_policy_arn = aws_iam_policy. sso_department_additional_policy [0 ]. arn
2671}
2772
2873data "aws_identitystore_group" "department" {
0 commit comments