AWS IAM User
This page shows how to write Terraform and CloudFormation for IAM User and write them securely.
aws_iam_user (Terraform)
The User in IAM can be configured in Terraform with the resource name aws_iam_user. The following sections describe 5 examples of how to use the resource and its parameters.
Example Usage from GitHub
resource "aws_iam_user" "AIDAI5VAHO4Y6DRKF6X3Y" {
name = "gamelift_player"
path = "/"
tags {}
}
resource "aws_iam_user" "AIDAI5VAHO4Y6DRKF6X3Y" {
name = "gamelift_player"
path = "/"
tags = {}
}
resource "aws_iam_user" "AIDAI5VAHO4Y6DRKF6X3Y" {
name = "gamelift_player"
path = "/"
tags {}
}
resource "aws_iam_user" "phisinee_s" {
name = "phisinee.s"
tags = {
email = "ange.l@pomelofashion.com"
}
resource "aws_iam_user" "travis_ci_ack" {
name = "travis-ci-ack"
}
resource "aws_iam_user" "travis_ci_aws_billing_alerts" {
name = "travis-ci-aws-billing-alerts"
Parameters
-
arnoptional computed - string -
force_destroyoptional - bool
Delete user even if it has non-Terraform-managed IAM access keys, login profile or MFA devices
-
idoptional computed - string -
namerequired - string -
pathoptional - string -
permissions_boundaryoptional - string -
tagsoptional - map from string to string -
unique_idoptional computed - string
Explanation in Terraform Registry
Provides an IAM user.
NOTE: If policies are attached to the user via the
aws_iam_policy_attachmentresource and you are modifying the usernameorpath, theforce_destroyargument must be set totrueand applied before attempting the operation otherwise you will encounter aDeleteConflicterror. Theaws_iam_user_policy_attachmentresource (recommended) does not have this requirement.
Tips: Best Practices for The Other AWS IAM Resources
In addition to the aws_iam_account_password_policy, AWS IAM has the other resources that should be configured for security reasons. Please check some examples of those resources and precautions.
aws_iam_account_password_policy
Ensure AWS IAM account password policies requires long passwords
It's better to enforce the use of long and complex passwords to reduce the risk of bruteforce attacks.
AWS::IAM::User (CloudFormation)
The User in IAM can be configured in CloudFormation with the resource name AWS::IAM::User. The following sections describe 10 examples of how to use the resource and its parameters.
Example Usage from GitHub
Type: "AWS::IAM::User"
Properties:
Groups:
- DevUsers
- ProdUsers
- PrimeUsers
Type: "AWS::IAM::User"
Properties:
Groups:
- DevUsers
- ProdUsers
- PrimeUsers
Type: "AWS::IAM::User"
Properties:
Groups:
- DevUsers
- ProdUsers
- PrimeUsers
Type: "AWS::IAM::User"
Properties:
Groups:
- Devusers
- Produsers
- PrimeUsers
Type: "AWS::IAM::User"
Properties:
Groups:
- Devusers
- Produsers
- PrimeUsers
"Type" : "AWS::IAM::User",
"Properties" : {
"UserName" : "applicationadministrator",
"Path" : "/",
"Groups" : [
{ "Fn::ImportValue" : { "Fn::Sub" : "${CustomGroupsStackName}-ApplicationAdministratorsGroup" }}
"Type" : "AWS::IAM::User",
"Properties" : {
"UserName" : "applicationadministrator",
"Path" : "/",
"Groups" : [
{ "Fn::ImportValue" : { "Fn::Sub" : "${CustomGroupsStackName}-ApplicationAdministratorsGroup" }}
"Type": "AWS::IAM::User",
"Properties": {
"UserName": "TestUser1",
"Path": "/"
}
},
"Type": "AWS::IAM::User",
"Properties": {
"UserName": "Scout2User001",
"Groups": [
"BlockedUsers"
]
"Type" : "AWS::IAM::User",
"Properties" : {
"UserName" : "mcrawford",
"Path" : "/",
"Groups" : [{ "Fn::ImportValue" : { "Fn::Sub" : "${StandardGroupsStackName}-AdministratorsGroup" }}]
}
Parameters
-
Groupsoptional - List -
LoginProfileoptional - LoginProfile -
ManagedPolicyArnsoptional - List -
Pathoptional - String -
PermissionsBoundaryoptional - String -
Policiesoptional - List of Policy -
Tagsoptional - List of Tag -
UserNameoptional - String
Explanation in CloudFormation Registry
Creates a new IAM user for your AWS account. For information about quotas for the number of IAM users you can create, see IAM and AWS STS quotas in the IAM User Guide.
Frequently asked questions
What is AWS IAM User?
AWS IAM User is a resource for IAM of Amazon Web Service. Settings can be wrote in Terraform and CloudFormation.
Where can I find the example code for the AWS IAM User?
For Terraform, the mortyre/misc, mortyre/misc and mortyre/misc source code examples are useful. See the Terraform Example section for further details.
For CloudFormation, the ServerlessOpsIO/infrastructure, ServerlessOpsIO/infrastructure and ServerlessOpsIO/infrastructure source code examples are useful. See the CloudFormation Example section for further details.