These are the input parameters for this template. All of these parameters must be supplied for this template to be deployed.
CloudFormation cannot create IAM Identity Providers, so it must be created before this teplate is run. Pass in the ARN of the created Shibboleth IDP here.
The KFS Acces role/policy allows those users access to appropriate resources.
Basic read info
Allow Docker registry access
This policy is only attached to the User Group, so will only apply to IAM users who have been added to the group, and not to SAML users logging in via the Role and Shibboleth.
Allow ALL IAM actions on any resource, with the exceptions of the IAM actions. Also enforces that the user MUST have MultiFactor authentication set up.
KFS User Role
This CloudFormation template will deploy an IAM role for KFS DevOps staff to access resources in the ua-erp account.