You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| <aname="input_account_assignments"></a> [account\_assignments](#input\_account\_assignments)| List of maps containing mapping between user/group, permission set and assigned accounts list. See account\_assignments description in README for more information about map values. | <pre>list(object({<br> principal_name = string,<br> principal_type = string,<br> permission_set = string,<br> account_ids = list(string)<br> }))</pre> |`[]`| no |
102
+
| <aname="input_identitystore_group_data_source_depends_on"></a> [identitystore\_group\_data\_source\_depends\_on](#input\_identitystore\_group\_data\_source\_depends\_on)| List of parameters that identitystore group data sources depend on, for example new SSO group IDs. |`list(string)`|`[]`| no |
103
+
| <aname="input_identitystore_user_data_source_depends_on"></a> [identitystore\_user\_data\_source\_depends\_on](#input\_identitystore\_user\_data\_source\_depends\_on)| List of parameters that identitystore user data sources depend on, for example new SSO user IDs. |`list(string)`|`[]`| no |
99
104
| <aname="input_permission_sets"></a> [permission\_sets](#input\_permission\_sets)| Map of maps containing Permission Set names as keys. See permission\_sets description in README for information about map values. |`any`| <pre>{<br> "AdministratorAccess": {<br> "description": "Provides full access to AWS services and resources.",<br> "managed_policies": [<br> "arn:aws:iam::aws:policy/AdministratorAccess"<br> ],<br> "session_duration": "PT2H"<br> }<br>}</pre> | no |
Example showing how to create SSO users and groups in the same state file as `terraform-aws-sso` module resources and without adding `depends_on` argument at the module level. Using null resource, it will only recreate account assignments, when new SSO group is added. It will NOT re-create all module resources, after a new AWS Account is added.
3
+
4
+
## Pre-requisites
5
+
Before this example can be used, please ensure that the following pre-requisites are met:
6
+
- Enable AWS Organizations and add AWS Accounts you want to be managed by SSO. [Documentation](https://docs.aws.amazon.com/organizations/latest/userguide/orgs_tutorials_basic.html)
- Ensure that Terraform is using a role with permissions required for AWS SSO management. [Documentation](https://docs.aws.amazon.com/singlesignon/latest/userguide/iam-auth-access-using-id-policies.html#requiredpermissionsconsole).
9
+
10
+
11
+
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
|[aws_organizations_organization.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/organizations_organization)| data source |
37
+
38
+
## Inputs
39
+
40
+
No inputs.
41
+
42
+
## Outputs
43
+
44
+
| Name | Description |
45
+
|------|-------------|
46
+
| <aname="output_aws_ssoadmin_permission_sets"></a> [aws\_ssoadmin\_permission\_sets](#output\_aws\_ssoadmin\_permission\_sets)| Maps of permission sets with attributes listed in Terraform resource aws\_ssoadmin\_permission\_set documentation. |
0 commit comments