b2b0a600aa
* Update solution.md I have added a solution to the exercise using Terraform * Update solution.md fixed some indentations * Update solution.md * Update solution.md Added a solution using Terraform
1.6 KiB
1.6 KiB
IAM AWS - Create a User
Objectives
As you probably know at this point, it's not recommended to work with the root account in AWS. For this reason you are going to create a new account which you'll use regularly as the admin account.
- Create a user with password credentials
- Add the newly created user to a group called "admin" and attach to it the policy called "Administrator Access"
- Make sure the user has a tag called with the key
Role
and the valueDevOps
Solution
-
Go to the AWS IAM service
-
Click on "Users" in the right side menu (right under "Access Management")
-
Click on the button "Add users"
-
Insert the user name (e.g. mario)
-
Select the credential type: "Password"
-
Set console password to custom and click on "Next"
-
Click on "Add user to group"
-
Insert "admin" as group name
-
Check the "AdministratorAccess" policy and click on "Create group"
-
Click on "Next: Tags"
-
Add a tag with the key
Role
and the valueDevOps
-
Click on "Review" and then create on "Create user"
-
Solution using Terraform
resource "aws_iam_group_membership" "team" {
name = "tf-testing-group-membership"
users = [
aws_iam_user.newuser.name,
]
group = aws_iam_group.admin.name
}
resource "aws_iam_group_policy_attachment" "test-attach" {
group = aws_iam_group.admin.name
policy_arn = "arn:aws:iam::aws:policy/AdministratorAccess"
}
resource "aws_iam_group" "admin" {
name = "admin"
}
resource "aws_iam_user" "newuser" {
name = "newuser"
path = "/system/"
tags = {
Role = "DevOps"
}
}