Skip to content

patheard/terraform-aws-client-vpn

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

14 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Terraform AWS Client VPN

Create an AWS Client VPN that uses AWS SSO as the identify provider. You will need to add the AWS SSO SAML Application metadata files to the terrafrom/metadata directory.

# Example .tfvars file
access_group_id     = "some_uuid"     # IAM identity center group ID
availability_zone   = "ca-central-1d" # AZ of the RDS writer instance
endpoint_name       = "test-vpn"
postgresql_username = "root_username"
postgresql_password = "root_password"

As part of this example an Aurora Postgres cluster is created in the private subnets that allows access while connected to the client VPN.

Credit

About

AWS client VPN using AWS SSO as the IdP

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published