Terraform
Tokenless Terraform using SAML.to
Introduction
The SAML.to Command Line Interface can be used for authentication to AWS and can be used with the terraform
CLI or any tool that supports Terraform (such as terragrunt
).
This document will detail how to use SAML.to to authenticate to AWS to run Terraform commands with Tokenless Authentication.
Create a Terraform Runner Role
Create a terraform-runner
role (or whatever name you prefer) that has a Trust Relationship to SAML.to.
In saml-to.yml
, grant access to GitHub Users to assume terraform-runner
:
Ensure the role is functional:
And run terraform init
to ensure you have access to the State File.
If the Role in AWS has Read/Write permissions to the AWS account, such as AdministratorAccess
, at this point, you can run terraform plan
and terraform apply
with the terraform-runner
identity.
If you want to make a second role in the same or another account, see A Terraform Applier Role.
Optional: A Terraform Applier Role
Create a second role in whatever AWS account you'd like, terraform-applier
(or whatever you want to call it) that grants terraform-runner
the ability to assume it:
It's not necessary to declare terraform-applier
in the saml-to.yml
. Role Assumption in Terraform uses STS Role Assumption internally and relies on IAM trust relationships!
Configure role assumption in Terraform:
Save the temporary credentials to ~/.aws/credentials
using the --save
flag on the SAML.to CLI:
And run Terraform commands:
Questions/Comments/Issues?
Last updated