You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|[aws_identitystore_group.by_display_name](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/identitystore_group)| data source |
29
30
|[aws_ssoadmin_instances.identity_center](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/ssoadmin_instances)| data source |
30
31
31
32
## Inputs
32
33
33
34
| Name | Description | Type | Default | Required |
| <aname="input_assignments"></a> [assignments](#input\_assignments)| List of assignments between group, account and permission set. The key of each object is the group<br> name that will be assigned the permissions. Ideally the organisation will use an external identity<br> provider and this group should be created via SCIM. To also create the groups, enable `create_groups`.<br><br> • `account_ids` - (Required) The AWS account IDs to apply the assignment.<br> • `permission_sets` - (Required) The Permission Sets to be assigned to the group. These should<br> be a subset of the Permission Sets created above. | <pre>map(list(object({<br> account_ids = list(string)<br> permission_sets = list(string)<br> })))</pre> | n/a | yes |
36
+
| <aname="input_assignments"></a> [assignments](#input\_assignments)| List of assignments between group, account and Permission Set. The key of each object is the group<br> name that will be assigned the permissions. Ideally the organisation will use an external identity<br> provider and this group should be created via SCIM. To also create the groups, enable `create_groups`.<br><br> • `account_ids` - (Required) The AWS account IDs to apply the assignment.<br> • `permission_sets` - (Required) The Permission Sets to be assigned to the group. These should<br> be a subset of the Permission Sets created above. | <pre>map(list(object({<br> account_ids = list(string)<br> permission_sets = list(string)<br> })))</pre> | n/a | yes |
36
37
| <aname="input_create_groups"></a> [create\_groups](#input\_create\_groups)| Whether the module should also create the groups. |`bool`|`false`| no |
37
-
| <aname="input_permission_sets"></a> [permission\_sets](#input\_permission\_sets)| List of permission sets for the organization.<br><br> • `name` - (Optional) The name of the Permission Set. The key will be used by default.<br> • `description` - (Optional) The description of the Permission Set.<br> • `managed_policies` - (Required) A list of managed policy names. The prefix `arn:aws:iam::aws:policy/`<br> will be prepended to create the full ARN.| <pre>map(object({<br> name = optional(string)<br> description = optional(string)<br> managed_policies = list(string)<br> }))</pre> | n/a | yes |
38
+
| <aname="input_permission_sets"></a> [permission\_sets](#input\_permission\_sets)| List of Permission Sets for the organization. Each Permission Set must include AWS managed<br> policies and/or an IAM inline policy.<br><br> • `name`- (Optional) The name of the Permission Set. The key will be used by default.<br> • `description`- (Optional) The description of the Permission Set.<br> • `managed_policies`- (Optional) A list of AWS-managed policy names. The prefix `arn:aws:iam::aws:policy/`<br> will be prepended to create the full ARN.<br> • `inline_policy` - (Optional) An IAM inline policy to attach to the Permission Set. | <pre>map(object({<br> name = optional(string)<br> description = optional(string)<br> managed_policies = optional(list(string), [])<br> inline_policy = optional(string, "")<br> }))</pre> | n/a | yes |
0 commit comments