You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| <aname="input_access_token_expiration"></a> [access\_token\_expiration](#input\_access\_token\_expiration)| Defines the access token expiration in seconds |`string`|`"3600"`| no |
148
-
| <aname="input_active_session_timeout"></a> [active\_session\_timeout](#input\_active\_session\_timeout)| Specify how long (seconds) a user is allowed to work continuously in the account |`number`|`86400`| no |
147
+
| <aname="input_access_token_expiration"></a> [access\_token\_expiration](#input\_access\_token\_expiration)| Defines the access token expiration in seconds, has no effect when `skip_iam_account_settings` is true.|`string`|`"3600"`| no |
148
+
| <aname="input_active_session_timeout"></a> [active\_session\_timeout](#input\_active\_session\_timeout)| Specify how long (seconds) a user is allowed to work continuously in the account, has no effect when `skip_iam_account_settings` is true.|`number`|`86400`| no |
149
149
| <aname="input_activity_tracker_locations"></a> [activity\_tracker\_locations](#input\_activity\_tracker\_locations)| Location of the route for the Activity Tracker, logs from these locations will be sent to the specified target. Supports passing individual regions, as well as `global` and `*`. |`list(string)`| <pre>[<br> "*",<br> "global"<br>]</pre> | no |
150
150
| <aname="input_activity_tracker_route_name"></a> [activity\_tracker\_route\_name](#input\_activity\_tracker\_route\_name)| Name of the route for the Activity Tracker, required if 'var.provision\_atracker\_cos' is true. |`string`|`null`| no |
151
-
| <aname="input_allowed_ip_addresses"></a> [allowed\_ip\_addresses](#input\_allowed\_ip\_addresses)| List of the IP addresses and subnets from which IAM tokens can be created for the account. |`list(any)`|`[]`| no |
152
-
| <aname="input_api_creation"></a> [api\_creation](#input\_api\_creation)| When restriction is enabled, only users, including the account owner, assigned the User API key creator role on the IAM Identity Service can create API keys. Allowed values are 'RESTRICTED', 'NOT\_RESTRICTED', or 'NOT\_SET' (to 'unset' a previous set value). |`string`|`"RESTRICTED"`| no |
151
+
| <aname="input_allowed_ip_addresses"></a> [allowed\_ip\_addresses](#input\_allowed\_ip\_addresses)| List of the IP addresses and subnets from which IAM tokens can be created for the account, has no effect when `skip_iam_account_settings` is true. |`list(any)`|`[]`| no |
152
+
| <aname="input_api_creation"></a> [api\_creation](#input\_api\_creation)| When restriction is enabled, only users, including the account owner, assigned the User API key creator role on the IAM Identity Service can create API keys. Allowed values are 'RESTRICTED', 'NOT\_RESTRICTED', or 'NOT\_SET' (to 'unset' a previous set value), has no effect when `skip_iam_account_settings` is true. |`string`|`"RESTRICTED"`| no |
153
153
| <aname="input_audit_resource_group_name"></a> [audit\_resource\_group\_name](#input\_audit\_resource\_group\_name)| The name of the audit resource group to create. |`string`|`null`| no |
154
154
| <aname="input_cos_bucket_access_tags"></a> [cos\_bucket\_access\_tags](#input\_cos\_bucket\_access\_tags)| A list of Access Tags applied to the created bucket. |`list(string)`|`[]`| no |
155
155
| <aname="input_cos_bucket_archive_days"></a> [cos\_bucket\_archive\_days](#input\_cos\_bucket\_archive\_days)| Number of days to archive objects in the bucket. |`number`|`20`| no |
@@ -174,31 +174,32 @@ No resources.
174
174
| <aname="input_cos_target_name"></a> [cos\_target\_name](#input\_cos\_target\_name)| Name of the COS Target for Activity Tracker, required if 'var.provision\_atracker\_cos' is true. |`string`|`null`| no |
175
175
| <aname="input_devops_resource_group_name"></a> [devops\_resource\_group\_name](#input\_devops\_resource\_group\_name)| The name of the devops resource group to create. |`string`|`null`| no |
176
176
| <aname="input_edge_resource_group_name"></a> [edge\_resource\_group\_name](#input\_edge\_resource\_group\_name)| The name of the edge resource group to create. |`string`|`null`| no |
177
-
| <aname="input_enforce_allowed_ip_addresses"></a> [enforce\_allowed\_ip\_addresses](#input\_enforce\_allowed\_ip\_addresses)| If true IP address restriction will be enforced, If false, traffic originated outside specified allowed IP address set is monitored with audit events sent to SIEM and Activity Tracker. After running in monitored mode to test this variable, it should then explicitly be set to true to enforce IP allow listing. |`bool`|`true`| no |
177
+
| <aname="input_enforce_allowed_ip_addresses"></a> [enforce\_allowed\_ip\_addresses](#input\_enforce\_allowed\_ip\_addresses)| If true IP address restriction will be enforced, If false, traffic originated outside specified allowed IP address set is monitored with audit events sent to SIEM and Activity Tracker. After running in monitored mode to test this variable, it should then explicitly be set to true to enforce IP allow listing, has no effect when `skip_iam_account_settings` is true. |`bool`|`true`| no |
178
178
| <aname="input_existing_cos_resource_group_name"></a> [existing\_cos\_resource\_group\_name](#input\_existing\_cos\_resource\_group\_name)| The name of an existing resource group to use for the COS instance/bucket, required if `var.provision_artacker_cos` is true and `var.observability_resource_group_name` is not provided. |`string`|`null`| no |
179
-
| <aname="input_inactive_session_timeout"></a> [inactive\_session\_timeout](#input\_inactive\_session\_timeout)| Specify how long (seconds) a user is allowed to stay logged in the account while being inactive/idle |`string`|`"7200"`| no |
179
+
| <aname="input_inactive_session_timeout"></a> [inactive\_session\_timeout](#input\_inactive\_session\_timeout)| Specify how long (seconds) a user is allowed to stay logged in the account while being inactive/idle, has no effect when `skip_iam_account_settings` is true.|`string`|`"7200"`| no |
180
180
| <aname="input_kms_key_crn"></a> [kms\_key\_crn](#input\_kms\_key\_crn)| CRN of the KMS key to use to encrypt the data in the COS bucket, required if 'var.provision\_atracker\_cos' is true. |`string`|`null`| no |
181
181
| <aname="input_management_resource_group_name"></a> [management\_resource\_group\_name](#input\_management\_resource\_group\_name)| The name of the management resource group to create. |`string`|`null`| no |
182
-
| <aname="input_max_sessions_per_identity"></a> [max\_sessions\_per\_identity](#input\_max\_sessions\_per\_identity)| Defines the maximum allowed sessions per identity required by the account. Supports any whole number greater than '0', or 'NOT\_SET' to unset account setting and use service default. |`string`|`"NOT_SET"`| no |
183
-
| <aname="input_mfa"></a> [mfa](#input\_mfa)| Specify Multi-Factor Authentication method in the account. Supported valid values are 'NONE' (No MFA trait set), 'TOTP' (For all non-federated IBMId users), 'TOTP4ALL' (For all users), 'LEVEL1' (Email based MFA for all users), 'LEVEL2' (TOTP based MFA for all users), 'LEVEL3' (U2F MFA for all users). |`string`|`"TOTP4ALL"`| no |
182
+
| <aname="input_max_sessions_per_identity"></a> [max\_sessions\_per\_identity](#input\_max\_sessions\_per\_identity)| Defines the maximum allowed sessions per identity required by the account. Supports any whole number greater than '0', or 'NOT\_SET' to unset account setting and use service default, has no effect when `skip_iam_account_settings` is true. |`string`|`"NOT_SET"`| no |
183
+
| <aname="input_mfa"></a> [mfa](#input\_mfa)| Specify Multi-Factor Authentication method in the account. Supported valid values are 'NONE' (No MFA trait set), 'TOTP' (For all non-federated IBMId users), 'TOTP4ALL' (For all users), 'LEVEL1' (Email based MFA for all users), 'LEVEL2' (TOTP based MFA for all users), 'LEVEL3' (U2F MFA for all users), has no effect when `skip_iam_account_settings` is true. |`string`|`"TOTP4ALL"`| no |
184
184
| <aname="input_observability_resource_group_name"></a> [observability\_resource\_group\_name](#input\_observability\_resource\_group\_name)| The name of the observability resource group to create. Required if `var.provision_atracker_cos` is true and `var.existing_cos_resource_group_name` is not provided. |`string`|`null`| no |
185
185
| <aname="input_provision_atracker_cos"></a> [provision\_atracker\_cos](#input\_provision\_atracker\_cos)| Enable to create an Atracker route and COS instance + bucket. |`bool`|`false`| no |
186
186
| <aname="input_provision_trusted_profile_projects"></a> [provision\_trusted\_profile\_projects](#input\_provision\_trusted\_profile\_projects)| Controls whether the Trusted Profile for Projects is provisioned. |`bool`|`true`| no |
187
-
| <aname="input_public_access_enabled"></a> [public\_access\_enabled](#input\_public\_access\_enabled)| Enable/Disable public access group in which resources are open anyone regardless if they are member of your account or not |`bool`|`false`| no |
188
-
| <aname="input_refresh_token_expiration"></a> [refresh\_token\_expiration](#input\_refresh\_token\_expiration)| Defines the refresh token expiration in seconds |`string`|`"259200"`| no |
187
+
| <aname="input_public_access_enabled"></a> [public\_access\_enabled](#input\_public\_access\_enabled)| Enable/Disable public access group in which resources are open anyone regardless if they are member of your account or not, has no effect when `skip_iam_account_settings` is true.|`bool`|`false`| no |
188
+
| <aname="input_refresh_token_expiration"></a> [refresh\_token\_expiration](#input\_refresh\_token\_expiration)| Defines the refresh token expiration in seconds, has no effect when `skip_iam_account_settings` is true.|`string`|`"259200"`| no |
189
189
| <aname="input_region"></a> [region](#input\_region)| Region to provision the COS resources created by this solution. |`string`|`"us-south"`| no |
190
190
| <aname="input_resource_tags"></a> [resource\_tags](#input\_resource\_tags)| A list of tags applied to the COS resources created by the module. |`list(string)`|`[]`| no |
191
191
| <aname="input_security_resource_group_name"></a> [security\_resource\_group\_name](#input\_security\_resource\_group\_name)| The name of the security resource group to create. |`string`|`null`| no |
192
-
| <aname="input_serviceid_creation"></a> [serviceid\_creation](#input\_serviceid\_creation)| When restriction is enabled, only users, including the account owner, assigned the Service ID creator role on the IAM Identity Service can create service IDs. Allowed values are 'RESTRICTED', 'NOT\_RESTRICTED', or 'NOT\_SET' (to 'unset' a previous set value). |`string`|`"RESTRICTED"`| no |
193
-
| <aname="input_shell_settings_enabled"></a> [shell\_settings\_enabled](#input\_shell\_settings\_enabled)| Enable global shell settings to all users in the account |`bool`|`false`| no |
192
+
| <aname="input_serviceid_creation"></a> [serviceid\_creation](#input\_serviceid\_creation)| When restriction is enabled, only users, including the account owner, assigned the Service ID creator role on the IAM Identity Service can create service IDs, has no effect when `skip_iam_account_settings` is true. Allowed values are 'RESTRICTED', 'NOT\_RESTRICTED', or 'NOT\_SET' (to 'unset' a previous set value). |`string`|`"RESTRICTED"`| no |
193
+
| <aname="input_shell_settings_enabled"></a> [shell\_settings\_enabled](#input\_shell\_settings\_enabled)| Enable global shell settings to all users in the account, has no effect when `skip_iam_account_settings` is true.|`bool`|`false`| no |
194
194
| <aname="input_skip_atracker_cos_iam_auth_policy"></a> [skip\_atracker\_cos\_iam\_auth\_policy](#input\_skip\_atracker\_cos\_iam\_auth\_policy)| Set to true to skip the creation of an IAM authorization policy that permits the Activity Tracker service Object Writer access to the Cloud Object Storage instance provisioned by this module. NOTE: If skipping, you must ensure the auth policy exists on the account before running the module. |`bool`|`false`| no |
195
-
| <aname="input_skip_cloud_shell_calls"></a> [skip\_cloud\_shell\_calls](#input\_skip\_cloud\_shell\_calls)| Skip Cloud Shell calls in the account. |`bool`|`false`| no |
195
+
| <aname="input_skip_cloud_shell_calls"></a> [skip\_cloud\_shell\_calls](#input\_skip\_cloud\_shell\_calls)| Skip Cloud Shell calls in the account, has no effect when `skip_iam_account_settings` is true. |`bool`|`false`| no |
196
196
| <aname="input_skip_cos_kms_auth_policy"></a> [skip\_cos\_kms\_auth\_policy](#input\_skip\_cos\_kms\_auth\_policy)| Whether to enable creating an IAM authoriation policy between the IBM Cloud Object Storage instance and the Key Management service instance of the CRN provided in `kms_key_crn`. This variable has no effect if `provision_atracker_cos` is false. |`bool`|`false`| no |
197
+
| <aname="input_skip_iam_account_settings"></a> [skip\_iam\_account\_settings](#input\_skip\_iam\_account\_settings)| Set to true to skip the IAM account settings being applied to the account |`bool`|`false`| no |
197
198
| <aname="input_trusted_profile_description"></a> [trusted\_profile\_description](#input\_trusted\_profile\_description)| Description of the trusted profile. |`string`|`"Trusted Profile for Projects access"`| no |
198
199
| <aname="input_trusted_profile_name"></a> [trusted\_profile\_name](#input\_trusted\_profile\_name)| Name of the trusted profile, required if `provision_trusted_profile_projects` is true. |`string`|`null`| no |
199
200
| <aname="input_trusted_profile_roles"></a> [trusted\_profile\_roles](#input\_trusted\_profile\_roles)| List of roles given to the trusted profile. |`list(string)`| <pre>[<br> "Administrator"<br>]</pre> | no |
200
-
| <aname="input_user_mfa"></a> [user\_mfa](#input\_user\_mfa)| Specify Multi-Factor Authentication method for specific users the account. Supported valid values are 'NONE' (No MFA trait set), 'TOTP' (For all non-federated IBMId users), 'TOTP4ALL' (For all users), 'LEVEL1' (Email based MFA for all users), 'LEVEL2' (TOTP based MFA for all users), 'LEVEL3' (U2F MFA for all users). Example of format is available here > https://github.com/terraform-ibm-modules/terraform-ibm-iam-account-settings#usage| <pre>set(object({<br> iam_id = string<br> mfa = string<br> }))</pre> |`[]`| no |
201
-
| <aname="input_user_mfa_reset"></a> [user\_mfa\_reset](#input\_user\_mfa\_reset)| Set to true to delete all user MFA settings configured in the targeted account, and ignoring entries declared in var user\_mfa |`bool`|`false`| no |
201
+
| <aname="input_user_mfa"></a> [user\_mfa](#input\_user\_mfa)| Specify Multi-Factor Authentication method for specific users the account. Supported valid values are 'NONE' (No MFA trait set), 'TOTP' (For all non-federated IBMId users), 'TOTP4ALL' (For all users), 'LEVEL1' (Email based MFA for all users), 'LEVEL2' (TOTP based MFA for all users), 'LEVEL3' (U2F MFA for all users). Example of format is available here > https://github.com/terraform-ibm-modules/terraform-ibm-iam-account-settings#usage, has no effect when `skip_iam_account_settings` is true.| <pre>set(object({<br> iam_id = string<br> mfa = string<br> }))</pre> |`[]`| no |
202
+
| <aname="input_user_mfa_reset"></a> [user\_mfa\_reset](#input\_user\_mfa\_reset)| Set to true to delete all user MFA settings configured in the targeted account, and ignoring entries declared in var user\_mfa, has no effect when `skip_iam_account_settings` is true.|`bool`|`false`| no |
202
203
| <aname="input_workload_resource_group_name"></a> [workload\_resource\_group\_name](#input\_workload\_resource\_group\_name)| The name of the workload resource group to create. |`string`|`null`| no |
0 commit comments