These are the input parameters for this template. All of these parameters must be supplied for this template to be deployed.
CloudFormation cannot create IAM Identity Providers, so it must be created before this teplate is run. Pass in the ARN of the created Shibboleth IDP here.
The UAR Acces role/policy allows those users access to appropriate resources.
Basic read info
Allow Docker registry access
Allow S3 access to the eas-ksd bucket
CloudWatch Logs UAR access
OpsWorks UAR access
UAR DEV Environment Stack
UAR STG Environment Stack
UAR SUP Environment Stack
UAR TRN Environment Stack
UAR TST Environment Stack
Kuali Service Delivery Stack
Certificat Manager access
This policy is only attached to the User Group, so will only apply to IAM users who have been added to the group, and not to SAML users logging in via the Role and Shibboleth.
Allow ALL IAM actions on any resource, with the exceptions of the IAM actions. Also enforces that the user MUST have MultiFactor authentication set up.
UAR Developer Role
This CloudFormation template will deploy an IAM role for UAR DevOps staff to access resources in the ua-erp account.