Skip to content

Pwd9000-ML/terraform-azurerm-rbac-administration

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Automated-Dependency-Tests-and-Release Dependabot

Module: Azure RBAC Administration

Description

Terraform Registry module for administering AZURE role assignments (RBAC).

See RBAC administration on new resources:
For an example of how to administer RBAC permissions against newly created AZURE resources.

See RBAC administration on existing resources:
For an example of how to administer RBAC permissions against existing AZURE resources.

This module is published on the Public Terraform Registry - rbac-administration

Enjoy!

Requirements

Name Version
terraform >= 1.5.6
azurerm ~> 3.110.0

Providers

Name Version
azurerm ~> 3.110.0

Modules

No modules.

Resources

Name Type
azurerm_role_assignment.rbac resource

Inputs

Name Description Type Default Required
azure_rbac_config Azure RBAC role assignment (permissions) configuration.
list(object({
description = string
scope = string
role_definition_name = string
principal_id = string
}))
[
{
"description": "Example - Azure RBAC permision on Subscription",
"principal_id": "00000000-0000-0000-0000-000000000000",
"role_definition_name": "Contributor",
"scope": "/subscriptions/00000000-0000-0000-0000-000000000000"
},
{
"description": "Example - Azure RBAC permision on Resource Group",
"principal_id": "00000000-0000-0000-0000-000000000000",
"role_definition_name": "Contributor",
"scope": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/myGroup"
},
{
"description": "Example - Azure RBAC permision on Resource",
"principal_id": "00000000-0000-0000-0000-000000000000",
"role_definition_name": "Contributor",
"scope": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/myGroup/providers/Microsoft.Compute/virtualMachines/myVM"
},
{
"description": "Example - Azure RBAC permision on Management Group",
"principal_id": "00000000-0000-0000-0000-000000000000",
"role_definition_name": "Contributor",
"scope": "/providers/Microsoft.Management/managementGroups/myMG"
}
]
no

Outputs

Name Description
role_assignment_ids The Role Assignment IDs.