aws-secrets-engine

devops-rob/aws-secrets-engine/vault

Terraform Module HCL VAULT

A Terraform module to enable and configure the AWS secrets engine in HashiCorp Vault.

Install
module "aws-secrets-engine" {
source = "devops-rob/aws-secrets-engine/vault"
version = "0.1.0"
}
plain text: /constructs/tfmod-devops-rob-aws-secrets-engine-vault/install.txt
⭐ Source on GitHub 📦 Registry page
README

Terraform Module: AWS Secrets Engine A Terraform module to enable and configure the AWS secrets engine in HashiCorp Vault. AWS requirements Vault will require an aws account is required with programmatic access. This account should have the ability to create, list, delete AWS accounts. For this example, Vault will also require an IAM group to place provisioned accounts. The permissions assigned to this group will depend on what actions the provisioned accounts need to perform. For more information about AWS Groups and permissions, refer to the following resources: - AWS Groups best practices - AWS Permissions best practices Usage example ``hcl provider "vault" { address = "http://localhost:8200" token = var.vault_token } variable "vault_token" {} variable "aws_access_key" {} variable "aws_

Inputs (13)
NameTypeDescriptionDefault
aws_sts_max_ttlnumberThe max allowed TTL in seconds for STS credentials (credentials TTL are capped t required
aws_secret_keystringSecret key for AWS account. WARNING - this will be written to the state file in required
aws_regionstringAWS region. Can also be set with the AWS_DEFAULT_REGION environment variable required
aws_backend_role_namestringName for AWS backend role required
aws_policy_arnslist(string)List of AWS managed policy ARNs. The behavior depends on the credential type. Wi required
aws_iam_groupslist(string)A list of IAM group names. IAM users generated against this vault role will be a required
aws_access_keystringAccess key for AWS account. WARNING - this will be written to the state file in required
aws_role_arnslist(string)List of ARNs of the AWS roles this Vault role is allowed to assume. Required whe required
aws_policy_documentstringThe IAM policy document for the role. The behavior depends on the credential typ required
aws_sts_default_ttlnumberThe default TTL in seconds for STS credentials. Valid only when credential_type required
aws_max_leasenumberMaximum lease for aws secrets engine. NOTE - This overrides the generic default 3600
aws_default_leasenumberDefault lease for aws secrets engine backend. NOTE - This overrides the generic 3600
aws_backend_role_cred_typestringtype of credential to be used when retrieving credentials from the role."iam_user"
Resources (2)
vault_aws_secret_backendvault_aws_secret_backend_role
Details
FrameworkTerraform Module
LanguageHCL
Version0.1.0
Cloud VAULT
★ Stars0
Forks2
Total downloads800
Inputs13
Resources2
Examples1
LicenseApache-2.0
Namespacedevops-rob
Updated