Skip to content

Commit 5e5f474

Browse files
Update documentation & dependabot entries
1 parent 15286fd commit 5e5f474

File tree

1 file changed

+3
-2
lines changed

1 file changed

+3
-2
lines changed

modules/aws/sso_account_assignment/README.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,16 +25,17 @@ to be used with AWS IAM Identity Center.
2525
| [aws_ssoadmin_account_assignment.to_group](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/ssoadmin_account_assignment) | resource |
2626
| [aws_ssoadmin_managed_policy_attachment.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/ssoadmin_managed_policy_attachment) | resource |
2727
| [aws_ssoadmin_permission_set.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/ssoadmin_permission_set) | resource |
28+
| [aws_ssoadmin_permission_set_inline_policy.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/ssoadmin_permission_set_inline_policy) | resource |
2829
| [aws_identitystore_group.by_display_name](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/identitystore_group) | data source |
2930
| [aws_ssoadmin_instances.identity_center](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/ssoadmin_instances) | data source |
3031

3132
## Inputs
3233

3334
| Name | Description | Type | Default | Required |
3435
|------|-------------|------|---------|:--------:|
35-
| <a name="input_assignments"></a> [assignments](#input\_assignments) | List of assignments between group, account and permission set. The key of each object is the group<br> name that will be assigned the permissions. Ideally the organisation will use an external identity<br> provider and this group should be created via SCIM. To also create the groups, enable `create_groups`.<br><br> • `account_ids` - (Required) The AWS account IDs to apply the assignment.<br> • `permission_sets` - (Required) The Permission Sets to be assigned to the group. These should<br> be a subset of the Permission Sets created above. | <pre>map(list(object({<br> account_ids = list(string)<br> permission_sets = list(string)<br> })))</pre> | n/a | yes |
36+
| <a name="input_assignments"></a> [assignments](#input\_assignments) | List of assignments between group, account and Permission Set. The key of each object is the group<br> name that will be assigned the permissions. Ideally the organisation will use an external identity<br> provider and this group should be created via SCIM. To also create the groups, enable `create_groups`.<br><br> • `account_ids` - (Required) The AWS account IDs to apply the assignment.<br> • `permission_sets` - (Required) The Permission Sets to be assigned to the group. These should<br> be a subset of the Permission Sets created above. | <pre>map(list(object({<br> account_ids = list(string)<br> permission_sets = list(string)<br> })))</pre> | n/a | yes |
3637
| <a name="input_create_groups"></a> [create\_groups](#input\_create\_groups) | Whether the module should also create the groups. | `bool` | `false` | no |
37-
| <a name="input_permission_sets"></a> [permission\_sets](#input\_permission\_sets) | List of permission sets for the organization.<br><br> • `name` - (Optional) The name of the Permission Set. The key will be used by default.<br> • `description` - (Optional) The description of the Permission Set.<br> • `managed_policies` - (Required) A list of managed policy names. The prefix `arn:aws:iam::aws:policy/`<br> will be prepended to create the full ARN. | <pre>map(object({<br> name = optional(string)<br> description = optional(string)<br> managed_policies = list(string)<br> }))</pre> | n/a | yes |
38+
| <a name="input_permission_sets"></a> [permission\_sets](#input\_permission\_sets) | List of Permission Sets for the organization. Each Permission Set must include AWS managed<br> policies and/or an IAM inline policy.<br><br>`name` - (Optional) The name of the Permission Set. The key will be used by default.<br> • `description` - (Optional) The description of the Permission Set.<br> • `managed_policies` - (Optional) A list of AWS-managed policy names. The prefix `arn:aws:iam::aws:policy/`<br> will be prepended to create the full ARN.<br> • `inline_policy` - (Optional) An IAM inline policy to attach to the Permission Set. | <pre>map(object({<br> name = optional(string)<br> description = optional(string)<br> managed_policies = optional(list(string), [])<br> inline_policy = optional(string, "")<br> }))</pre> | n/a | yes |
3839
<!-- END_TF_DOCS -->
3940

4041
# Example Usage

0 commit comments

Comments
 (0)