oidc-auth-method

bmcdonald05/oidc-auth-method/vault

Terraform Module HCL VAULT

Terraform module for the Vault provider for enabling the OIDC auth method and creating an identity group/alias for external group mappings.

Install
module "oidc-auth-method" {
source = "bmcdonald05/oidc-auth-method/vault"
version = "1.0.4"
}
plain text: /constructs/tfmod-bmcdonald05-oidc-auth-method-vault/install.txt
⭐ Source on GitHub 📦 Registry page
README

terraform-vault-oidc-auth-method Terraform module for the Vault provider for enabling the OIDC auth method. Currently it creates the following items: - Enables the OIDC auth method at a configurable path - A default role for the OIDC auth method with either the "default" Vault policy or NO Vault policy - An external identity group that can be assigned additional Vault policies for permissions - An identity group alias attached to the external identity group for mapping external IdP groups The aim of this module is to solve a common scenario where a Vault operator needs to setup the OIDC auth method. The "default" role required for authentication will allow any user with valid credentials, and access to the OIDC application on the Identity Provider (IdP) side to successfully authenticate to

Inputs (27)
NameTypeDescriptionDefault
user_claimstringThe claim to use to uniquely identify the user; this will be used as the name fo""
additional_policieslist(any)List of strings. Additional policies to add to external groups as desired.[ "" ]
bound_issuerstringThe value against which to match the iss claim in a JWT.null
claim_mappingsmap(string)If set, a map of claims (keys) to be copied to specified metadata fields (values{}
provider_configmap(string)Provider specific handling configuration. All values may be strings, and the pro{}
bound_claimsmap(string)If set, a map of claims to values to match against. A claim's value must be a st{}
oidc_discovery_urlstringThe OIDC Discovery URL, without any .well-known component (base path).""
token_ttlnumberThe incremental lifetime for generated tokens in number of seconds. Defaults to 86400
enable_debug_logboolLog received OIDC tokens and claims when debug-level logging is active to troublfalse
bound_claims_typestringHow to interpret values in the claims/values map (bound_claims): can be either s"string"
oidc_response_typeslist(any)List of response types to request. Allowed values are 'code' and 'id_token'. Def[ "" ]
oidc_scopeslist(any)If set, a list of OIDC scopes to be used with an OIDC role. The standard scope '[ "" ]
bound_audienceslist(string)List of aud claims to match against. Any match is sufficient.[ "" ]
no_default_policyboolIf set, the default policy will NOT be set on generated tokens; otherwise it wilfalse
oidc_client_secretstringClient Secret used for OIDC backend.""
bound_subjectstringIf set, requires that the sub claim matches this value.null
oidc_client_idstringClient ID used for OIDC backend.""
pathstringPath to mount the OIDC auth backend"oidc"
external_group_identifierstringName of the group alias to create. This name needs to match the group identifier""
group_namestringThe actual name of the external identity group to create; defaults to 'oidc-admi"oidc-admins-group"
Outputs (4)
oidc_accessor — The accessor for this OIDC auth method.
oidc_path — The path this OIDC auth method was enabled at.
external_group_id — The ID of the created external group
external_group_alias_id — The ID of the created group alias
Resources (4)
vault_identity_groupvault_identity_group_aliasvault_jwt_auth_backendvault_jwt_auth_backend_role
Details
FrameworkTerraform Module
LanguageHCL
Version1.0.4
Cloud VAULT
★ Stars1
Forks1
Total downloads653
Inputs27
Outputs4
Resources4
Examples2
LicenseApache-2.0
Namespacebmcdonald05
Updated