Azure Authorization Azure User Assigned Identity
This page shows how to write Terraform for Authorization Azure User Assigned Identity and write them securely.
The Azure User Assigned Identity in Authorization can be configured in Terraform with the resource name
azure_user_assigned_identity. The following sections describe how to use the resource and its parameters.
Example Usage from GitHub
An example could not be found in GitHub.
The following arguments are supported:
name- (Required) The name of the user assigned identity. Changing this forces a new identity to be created.
resource_group_name- (Required) The name of the resource group in which to create the user assigned identity.
location- (Required) The location/region where the user assigned identity is created.
tags- (Optional) A mapping of tags to assign to the resource.
The following attributes are exported:
id- The user assigned identity ID.
principal_id- Service Principal ID associated with the user assigned identity.
client_id- Client ID associated with the user assigned identity.
tenant_id- Tenant ID associated with the user assigned identity.
Explanation in Terraform Registry
Manages a user assigned identity.
Tips: Best Practices for The Other Azure Authorization Resources
In addition to the azurerm_role_definition, Azure Authorization has the other resources that should be configured for security reasons. Please check some examples of those resources and precautions.
Ensure to grant targeted permissions for roles
It is better to avoid giving too many permissions to a role. By following the principle of least privilege, you can reduce the risk of credential leakage.
Azure Resource Manager Example
Azure Resource Manager code does not have the related resource.