Menu
Generates a secure private key and encodes it as PEM. This resource isprimarily intended for easily bootstrapping throwaway developmentenvironments.
With the Access, and Secret key you can use the api based tools (cli. Powershell, boto) to perform some actions at the instance level but you won't be able to ssh into it without the key generated (or selected) at the instance's launch time. Anyone who has root user access keys for your AWS account has unrestricted access to all the resources in your account, including billing information. When you create access keys, you create the access key ID and secret access key as a set.
Important Security Notice The private key generated by this resource willbe stored unencrypted in your Terraform state file. Use of this resourcefor production deployments is not recommended. Instead, generatea private key file outside of Terraform and distribute it securelyto the system where Terraform will be run.
Aws Use Rsa Private Key To Generate Secret Access Key Download
This is a logical resource, so it contributes only to the current Terraformstate and does not create any external managed resources.
![]() » Example Usage» Argument Reference
The following arguments are supported:
» Attributes Reference
The following attributes are exported:
» Generating a New Key
Since a private key is a logical resource that lives only in the Terraform state,it will persist until it is explicitly destroyed by the user.
Aws Use Rsa Private Key To Generate Secret Access Key And Signing Method
In order to force the generation of a new key within an existing state, theprivate key instance can be 'tainted':
Aws Use Rsa Private Key To Generate Secret Access Key West
A new key will then be generated on the next
terraform apply .
Comments are closed.
|
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |