|
21 | 21 | "iam"
|
22 | 22 | ],
|
23 | 23 | "short_description": "Creates and configures the base layer components of an IBM Cloud account",
|
24 |
| - "long_description": "This architecture supports creating and configuring the foundational components of an IBM Cloud account. This includes IAM account settings, a trusted profile and associated access groups, and the resource groups in which all resources are provisioned [Learn more...](https://github.com/terraform-ibm-modules/terraform-ibm-account-infrastructure-base/tree/main/docs/about.md)\n\nYou can choose from two variations when deploying:\n * **Resource groups only**: Creates a structured set of IBM Cloud resource groups to help organize cloud resources by function [Learn more...](https://github.com/terraform-ibm-modules/terraform-ibm-account-infrastructure-base/tree/main/docs/resource-group-configuration.md)\n * **Resource groups with Account Settings**: In addition to resource groups, configures account-level settings for access control, security, and compliance alignment [Learn more...](https://github.com/terraform-ibm-modules/terraform-ibm-account-infrastructure-base/tree/main/docs/account-settings-configuration.md)", |
| 24 | + "long_description": "This architecture supports creating and configuring the foundational components of an IBM Cloud account. This includes IAM account settings, a trusted profile and associated access groups, and the resource groups in which all resources are provisioned [Learn more](https://github.com/terraform-ibm-modules/terraform-ibm-account-infrastructure-base/tree/main/docs/about.md).\n\nYou can choose from two variations when deploying:\n **Resource groups only**: Creates a structured set of IBM Cloud resource groups to help organize cloud resources by function [Learn more](https://github.com/terraform-ibm-modules/terraform-ibm-account-infrastructure-base/tree/main/docs/resource-group-configuration.md).\n **Resource groups with Account Settings**: In addition to resource groups, configures account-level settings for access control, security, and compliance alignment [Learn more](https://github.com/terraform-ibm-modules/terraform-ibm-account-infrastructure-base/tree/main/docs/account-settings-configuration.md).", |
25 | 25 | "offering_docs_url": "https://github.com/terraform-ibm-modules/terraform-ibm-account-infrastructure-base/tree/main/docs/about.md",
|
26 | 26 | "offering_icon_url": "https://raw.githubusercontent.com/terraform-ibm-modules/documentation/main/icons/security_icon.svg",
|
27 | 27 | "provider_name": "IBM",
|
28 | 28 | "features": [
|
29 | 29 | {
|
30 |
| - "title": "Configures IAM account settings", |
31 |
| - "description": "Configures IAM account settings to meet compliance requirements fof the IBM Cloud Framework for Financial Services." |
| 30 | + "title": "IAM account settings", |
| 31 | + "description": "Configures IAM account settings to meet compliance requirements for the IBM Cloud Framework for Financial Services." |
32 | 32 | },
|
33 | 33 | {
|
34 |
| - "title": "Creates access controls", |
| 34 | + "title": "Access controls", |
35 | 35 | "description": "Creates a trusted profile and associated access group to give Projects access to securely deploy solutions in this account."
|
36 | 36 | },
|
37 | 37 | {
|
38 |
| - "title": "Creates a resource group", |
| 38 | + "title": "Resource group", |
39 | 39 | "description": "Creates resource group where all resources created by this solution are provisioned."
|
40 | 40 | },
|
41 | 41 | {
|
42 |
| - "title": "Creates CBR rules", |
| 42 | + "title": "CBR rules", |
43 | 43 | "description": "Creates pre-wired CBR rules in a given account following a secure by default approach."
|
44 | 44 | }
|
45 | 45 | ],
|
|
48 | 48 | {
|
49 | 49 | "label": "Resource groups with account settings",
|
50 | 50 | "name": "resource-groups-with-account-settings",
|
| 51 | + "index": 1, |
51 | 52 | "install_type": "fullstack",
|
52 | 53 | "working_directory": "solutions/fully-configurable",
|
53 | 54 | "compliance": {
|
|
65 | 66 | "role_crns": [
|
66 | 67 | "crn:v1:bluemix:public:iam::::role:Administrator"
|
67 | 68 | ],
|
68 |
| - "service_name": "iam-identity" |
| 69 | + "service_name": "All Account Management services", |
| 70 | + "notes": "Administrator access is required for resource group creation and deletion." |
| 71 | + }, |
| 72 | + { |
| 73 | + "role_crns": [ |
| 74 | + "crn:v1:bluemix:public:iam::::role:Administrator" |
| 75 | + ], |
| 76 | + "service_name": "All Identity and Access enabled services", |
| 77 | + "notes": "(Optional) Only required if creating context-based restrictions which can be toggled using the `provision_cbr` input." |
69 | 78 | }
|
70 | 79 | ],
|
71 | 80 | "architecture": {
|
| 81 | + "features": [ |
| 82 | + { |
| 83 | + "title": " ", |
| 84 | + "description": "Orchestrates the creation of resource groups, account-level IAM settings, trusted profiles, and context-based restriction (CBR) rules." |
| 85 | + } |
| 86 | + ], |
72 | 87 | "diagrams": [
|
73 | 88 | {
|
74 | 89 | "diagram": {
|
75 | 90 | "caption": "Account Configuration",
|
76 | 91 | "url": "https://raw.githubusercontent.com/terraform-ibm-modules/terraform-ibm-account-infrastructure-base/main/reference-architectures/base-account-enterprise.svg",
|
77 | 92 | "type": "image/svg+xml"
|
78 | 93 | },
|
79 |
| - "description": "The Account Configuration architecture provides a standardized approach to setting up cloud account settings as outlined in the IBM Cloud Framework for Financial Services. The architecture includes configurations for IAM settings and access controls that enforce security best practices. You can use this architecture as a base for deploying additional services and resources in multiple types of accounts, such as administrative or workload accounts." |
| 94 | + "description": "**IBM Account Configuration** <br/> <br/> <b>Description</b> <br/>The Account Configuration architecture provides a standardized approach to setting up cloud account settings as outlined in the IBM Cloud Framework for Financial Services. The architecture includes configurations for IAM settings and access controls that enforce security best practices. You can use this architecture as a base for deploying additional services and resources in multiple types of accounts, such as administrative or workload accounts." |
80 | 95 | }
|
81 | 96 | ]
|
82 | 97 | },
|
|
90 | 105 | },
|
91 | 106 | {
|
92 | 107 | "key": "provider_visibility",
|
| 108 | + "hidden": true, |
93 | 109 | "options": [
|
94 | 110 | {
|
95 | 111 | "displayname": "private",
|
|
317 | 333 | {
|
318 | 334 | "label": "Resource groups only",
|
319 | 335 | "name": "resource-group-only",
|
| 336 | + "index": 2, |
320 | 337 | "install_type": "fullstack",
|
321 | 338 | "working_directory": "solutions/fully-configurable",
|
322 | 339 | "iam_permissions": [
|
323 | 340 | {
|
324 | 341 | "role_crns": [
|
325 |
| - "crn:v1:bluemix:public:iam::::role:Editor" |
| 342 | + "crn:v1:bluemix:public:iam::::role:Administrator" |
326 | 343 | ],
|
327 |
| - "service_name": "resource-group" |
| 344 | + "service_name": "All Account Management services", |
| 345 | + "notes": "Administrator access is required for resource group creation and deletion." |
328 | 346 | }
|
329 | 347 | ],
|
330 | 348 | "architecture": {
|
| 349 | + "features": [ |
| 350 | + { |
| 351 | + "title": " ", |
| 352 | + "description": "Orchestrates the creation of resource groups as well as referencing existing resource groups across different functional categories." |
| 353 | + } |
| 354 | + ], |
331 | 355 | "diagrams": [
|
332 | 356 | {
|
333 | 357 | "diagram": {
|
334 | 358 | "caption": "Resource Groups",
|
335 | 359 | "url": "https://raw.githubusercontent.com/terraform-ibm-modules/terraform-ibm-account-infrastructure-base/main/reference-architectures/rg-only.svg",
|
336 | 360 | "type": "image/svg+xml"
|
337 | 361 | },
|
338 |
| - "description": "The Account Configuration architecture provides a standardized set of resource groups to prepare for different scenarios. You can use this architecture as a base for deploying additional services and resources in multiple types of accounts, such as administrative or workload accounts." |
| 362 | + "description": "**IBM Account Configuration** <br/> <br/> <b>Description</b> <br/>The Account Configuration architecture provides a standardized set of resource groups to prepare for different scenarios. You can use this architecture as a base for deploying additional services and resources in multiple types of accounts, such as administrative or workload accounts." |
339 | 363 | }
|
340 | 364 | ]
|
341 | 365 | },
|
|
347 | 371 | "key": "prefix",
|
348 | 372 | "required": true
|
349 | 373 | },
|
350 |
| - { |
351 |
| - "key": "provider_visibility", |
352 |
| - "options": [ |
353 |
| - { |
354 |
| - "displayname": "private", |
355 |
| - "value": "private" |
356 |
| - }, |
357 |
| - { |
358 |
| - "displayname": "public", |
359 |
| - "value": "public" |
360 |
| - }, |
361 |
| - { |
362 |
| - "displayname": "public-and-private", |
363 |
| - "value": "public-and-private" |
364 |
| - } |
365 |
| - ] |
366 |
| - }, |
367 |
| - { |
368 |
| - "key": "single_resource_group_name" |
369 |
| - }, |
370 |
| - { |
371 |
| - "key": "use_existing_single_resource_group" |
372 |
| - }, |
373 |
| - { |
374 |
| - "key": "audit_resource_group_name" |
375 |
| - }, |
376 |
| - { |
377 |
| - "key": "use_existing_audit_resource_group" |
378 |
| - }, |
379 |
| - { |
380 |
| - "key": "devops_resource_group_name" |
381 |
| - }, |
382 |
| - { |
383 |
| - "key": "use_existing_devops_resource_group" |
384 |
| - }, |
385 |
| - { |
386 |
| - "key": "edge_resource_group_name" |
387 |
| - }, |
388 |
| - { |
389 |
| - "key": "use_existing_edge_resource_group" |
390 |
| - }, |
391 |
| - { |
392 |
| - "key": "management_resource_group_name" |
393 |
| - }, |
394 |
| - { |
395 |
| - "key": "use_existing_management_resource_group" |
396 |
| - }, |
397 |
| - { |
398 |
| - "key": "observability_resource_group_name" |
399 |
| - }, |
400 |
| - { |
401 |
| - "key": "use_existing_observability_resource_group" |
402 |
| - }, |
403 |
| - { |
404 |
| - "key": "security_resource_group_name" |
405 |
| - }, |
406 |
| - { |
407 |
| - "key": "use_existing_security_resource_group" |
408 |
| - }, |
409 |
| - { |
410 |
| - "key": "workload_resource_group_name" |
411 |
| - }, |
412 |
| - { |
413 |
| - "key": "use_existing_workload_resource_group" |
414 |
| - }, |
415 | 374 | {
|
416 | 375 | "key": "skip_iam_account_settings",
|
417 | 376 | "default_value": true,
|
|
506 | 465 | {
|
507 | 466 | "key": "cbr_kms_service_targeted_by_prewired_rules",
|
508 | 467 | "hidden": true
|
| 468 | + }, |
| 469 | + { |
| 470 | + "key": "single_resource_group_name" |
| 471 | + }, |
| 472 | + { |
| 473 | + "key": "use_existing_single_resource_group" |
| 474 | + }, |
| 475 | + { |
| 476 | + "key": "audit_resource_group_name" |
| 477 | + }, |
| 478 | + { |
| 479 | + "key": "use_existing_audit_resource_group" |
| 480 | + }, |
| 481 | + { |
| 482 | + "key": "devops_resource_group_name" |
| 483 | + }, |
| 484 | + { |
| 485 | + "key": "use_existing_devops_resource_group" |
| 486 | + }, |
| 487 | + { |
| 488 | + "key": "edge_resource_group_name" |
| 489 | + }, |
| 490 | + { |
| 491 | + "key": "use_existing_edge_resource_group" |
| 492 | + }, |
| 493 | + { |
| 494 | + "key": "management_resource_group_name" |
| 495 | + }, |
| 496 | + { |
| 497 | + "key": "use_existing_management_resource_group" |
| 498 | + }, |
| 499 | + { |
| 500 | + "key": "observability_resource_group_name" |
| 501 | + }, |
| 502 | + { |
| 503 | + "key": "use_existing_observability_resource_group" |
| 504 | + }, |
| 505 | + { |
| 506 | + "key": "security_resource_group_name" |
| 507 | + }, |
| 508 | + { |
| 509 | + "key": "use_existing_security_resource_group" |
| 510 | + }, |
| 511 | + { |
| 512 | + "key": "workload_resource_group_name" |
| 513 | + }, |
| 514 | + { |
| 515 | + "key": "use_existing_workload_resource_group" |
| 516 | + }, |
| 517 | + { |
| 518 | + "key": "provider_visibility", |
| 519 | + "hidden": true, |
| 520 | + "options": [ |
| 521 | + { |
| 522 | + "displayname": "private", |
| 523 | + "value": "private" |
| 524 | + }, |
| 525 | + { |
| 526 | + "displayname": "public", |
| 527 | + "value": "public" |
| 528 | + }, |
| 529 | + { |
| 530 | + "displayname": "public-and-private", |
| 531 | + "value": "public-and-private" |
| 532 | + } |
| 533 | + ] |
509 | 534 | }
|
510 | 535 | ]
|
511 | 536 | }
|
|
0 commit comments