Difference between revisions of "Terraform resource: aws iam user"
Jump to navigation
Jump to search
(19 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
− | + | <code>[[aws_iam_user]]</code> https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_user | |
+ | |||
+ | == Examples == | ||
+ | |||
+ | === Official example === | ||
+ | resource "aws_iam_user" "lb" { | ||
+ | name = "loadbalancer" | ||
+ | path = "/system/" | ||
+ | |||
+ | [[tags]] = { | ||
+ | tag-key = "tag-value" | ||
+ | } | ||
+ | } | ||
+ | |||
+ | resource "[[aws_iam_access_key]]" "lb" { | ||
+ | user = aws_iam_user.lb.name | ||
+ | } | ||
+ | |||
+ | resource "[[aws_iam_user_policy]]" "lb_ro" { | ||
+ | name = "test" | ||
+ | user = aws_iam_user.lb.name | ||
+ | |||
+ | policy = <<EOF | ||
+ | { | ||
+ | "Version": "2012-10-17", | ||
+ | "Statement": [ | ||
+ | { | ||
+ | "Action": [ | ||
+ | "[[ec2:Describe]]*" | ||
+ | ], | ||
+ | "Effect": "Allow", | ||
+ | "Resource": "*" | ||
+ | } | ||
+ | ] | ||
+ | } | ||
+ | EOF | ||
+ | } | ||
+ | |||
+ | === Additional examples === | ||
+ | resource "aws_iam_user" "mytest" { | ||
+ | name = "mytest" | ||
+ | } | ||
+ | |||
+ | === Access key and [[SMTP]] password === | ||
+ | |||
+ | {{aws iam user aws iam access key aws iam smtp password v4}} | ||
+ | |||
+ | == Related == | ||
+ | * <code>[[aws_iam_role]]</code> | ||
+ | * <code>[[aws_iam_user_policy]]</code> | ||
+ | * [[Terraform EKS module]]: <code>[[aws_auth_users]]</code> | ||
+ | * [[AWS IAM users]] | ||
+ | * <code>[[aws_identitystore_user]]</code> | ||
== See also == | == See also == | ||
− | * {{terraform aws resources}} | + | * {{aws_iam_user}} |
+ | * {{terraform aws iam resources}} | ||
[[Category:Terraform]] | [[Category:Terraform]] |
Latest revision as of 16:20, 10 October 2024
aws_iam_user
https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_user
Contents
Examples[edit]
Official example[edit]
resource "aws_iam_user" "lb" { name = "loadbalancer" path = "/system/" tags = { tag-key = "tag-value" } } resource "aws_iam_access_key" "lb" { user = aws_iam_user.lb.name } resource "aws_iam_user_policy" "lb_ro" { name = "test" user = aws_iam_user.lb.name policy = <<EOF { "Version": "2012-10-17", "Statement": [ { "Action": [ "ec2:Describe*" ], "Effect": "Allow", "Resource": "*" } ] } EOF }
Additional examples[edit]
resource "aws_iam_user" "mytest" { name = "mytest" }
Access key and SMTP password[edit]
resource "aws_iam_user" "test" { name = "test" path = "/test/" } resource "aws_iam_access_key" "test" { user = aws_iam_user.test.name } output "aws_iam_smtp_password_v4" { value = aws_iam_access_key.test.ses_smtp_password_v4 }
Related[edit]
aws_iam_role
aws_iam_user_policy
- Terraform EKS module:
aws_auth_users
- AWS IAM users
aws_identitystore_user
See also[edit]
aws_iam_user, aws_iam_access_key, aws_identitystore_user
- Terraform IAM resources:
aws_iam_user, aws_iam_group, aws_iam_role, aws_iam_role_policy_attachment
,aws_iam_policy
,aws_iam_role_policy, aws_iam_user_policy, aws_iam_user_policy_attachment
,aws_iam_access_key, aws_iam_group_policy, aws_iam_group_policy_attachment, aws_iam_openid_connect_provider
Advertising: