Skip to content

Commit ac8cc4f

Browse files
authored
formatting updates
1 parent 0ef145d commit ac8cc4f

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

website/docs/index.html.markdown

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,7 @@ In order to enable the Terraform MongoDB Atlas Provider with AWS SM, please foll
8888
"private_key":"secret2"
8989
}
9090
```
91-
2. Create an AWS IAM Role to attach to the AWS STS (Security Token Service) generated short lived API keys. This is required since STS generated API Keys by default have restricted permissions and need to have their permissions elevated in order to authenticate with Terraform. Take note of Role ARN and ensure IAM Role has permission for “sts:AssumeRole . For example:
91+
2. Create an AWS IAM Role to attach to the AWS STS (Security Token Service) generated short lived API keys. This is required since STS generated API Keys by default have restricted permissions and need to have their permissions elevated in order to authenticate with Terraform. Take note of Role ARN and ensure IAM Role has permission for “sts:AssumeRole”. For example:
9292
```
9393
{
9494
"Version": "2012-10-17",
@@ -99,13 +99,13 @@ In order to enable the Terraform MongoDB Atlas Provider with AWS SM, please foll
9999
"Principal": {
100100
"AWS": "*"
101101
},
102-
"Action": [
103-
"sts:AssumeRole"
104-
]
102+
"Action": "sts:AssumeRole"
105103
}
106104
]
107105
}
108106
```
107+
In addition, you are required to also attach the AWS Managed policy of `SecretsManagerReadWrite` to this IAM role.
108+
109109
Note: this policy may be overly broad for many use cases, feel free to adjust accordingly to your organization's needs.
110110

111111
3. In terminal, store as environmental variables AWS API Keys (while you can also hardcode in config files these will then be stored as plain text in .tfstate file and should be avoided if possible). For example:

0 commit comments

Comments
 (0)