Merge pull request #6500 from hashicorp/radeksimko-patch-1

aws: Update docs after #6385 (account ID via sts)
This commit is contained in:
Radek Simko 2016-05-05 18:01:33 +01:00
commit 03bc54b438
1 changed files with 6 additions and 3 deletions

View File

@ -182,13 +182,16 @@ in order to compare it with allowed/forbidden ones.
Approaches differ per auth providers: Approaches differ per auth providers:
* EC2 instance w/ IAM Instance Profile - [Metadata API](http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-metadata.html) * EC2 instance w/ IAM Instance Profile - [Metadata API](http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-metadata.html)
is always used is always used. Introduced in Terraform `0.6.16`.
* All other providers (ENV vars, shared creds file, ...) * All other providers (ENV vars, shared creds file, ...)
will try two approaches in the following order will try two approaches in the following order
* `iam:GetUser` - typically useful for IAM Users. It also means * `iam:GetUser` - typically useful for IAM Users. It also means
that each user needs to be privileged to call `iam:GetUser` for themselves. that each user needs to be privileged to call `iam:GetUser` for themselves.
* `sts:GetCallerIdentity` - _Should_ work for both IAM Users and federated IAM Roles,
introduced in Terraform `0.6.16`.
* `iam:ListRoles` - this is specifically useful for IdP-federated profiles * `iam:ListRoles` - this is specifically useful for IdP-federated profiles
which cannot use `iam:GetUser`. It also means that each federated user which cannot use `iam:GetUser`. It also means that each federated user
need to be _assuming_ an IAM role which allows `iam:ListRoles`. need to be _assuming_ an IAM role which allows `iam:ListRoles`.
There is currently no better clean way to get account ID Used in Terraform `0.6.16+`.
out of the API when using federated account unfortunately. There used to be no better way to get account ID out of the API
when using federated account until `sts:GetCallerIdentity` was introduced.