SecurityAnalystRole:
Type: AWS::IAM::Role
Properties:
RoleName: fdn-SecurityAnalyst
AssumeRolePolicyDocument:
Statement:
- Effect: "Allow"
Principal:
Federated: !Sub "arn:aws:iam::${AWS::AccountId}:saml-provider/UA_Shibboleth_IdP"
Action: sts:AssumeRoleWithSAML
Condition:
StringEquals:
SAML:aud: https:
ManagedPolicyArns:
- arn:aws:iam::aws:policy/SecurityAudit
- arn:aws:iam::aws:policy/AWSSupportAccess
Resources
These are all of the resources deployed by this template.