Azure Authorization Azure User Assigned Identity
This page shows how to write Terraform for Authorization Azure User Assigned Identity and write them securely.
azure_user_assigned_identity (Terraform)
The Azure User Assigned Identity in Authorization can be configured in Terraform with the resource name azure_user_assigned_identity
. The following sections describe how to use the resource and its parameters.
Example Usage from GitHub
An example could not be found in GitHub.
Parameters
The following arguments are supported:
name
- (Required) The name of the user assigned identity. Changing this forces a new identity to be created.resource_group_name
- (Required) The name of the resource group in which to create the user assigned identity.location
- (Required) The location/region where the user assigned identity is created.tags
- (Optional) A mapping of tags to assign to the resource.
The following attributes are exported:
id
- The user assigned identity ID.principal_id
- Service Principal ID associated with the user assigned identity.client_id
- Client ID associated with the user assigned identity.tenant_id
- Tenant ID associated with the user assigned identity.
Explanation in Terraform Registry
Manages a user assigned identity.
Tips: Best Practices for The Other Azure Authorization Resources
In addition to the azurerm_role_definition, Azure Authorization has the other resources that should be configured for security reasons. Please check some examples of those resources and precautions.
azurerm_role_definition
Ensure to grant targeted permissions for roles
It is better to avoid giving too many permissions to a role. By following the principle of least privilege, you can reduce the risk of credential leakage.
Azure Resource Manager Example
Azure Resource Manager code does not have the related resource.