Ensure you are logged into both AWS & Azure systems from your CLI before executing below terraform commands.
aws sts get-caller-identity
az account show
Connect to Azure systems from AWS Cloud. In this example, we will use AWS VM to connect with Azure resources.
terraform init
terraform plan
terraform apply
Post terraform apply
, copy the ssh command from the output and login to the AWS VM.
- Some pre-requisities will be installed
- Connectivity to the Azure systems will be established
- Test it by running the command shown.
terraform destroy
There's no in-built terraform module to get OpenID Connect token, aws cognito-identity get-open-id-token-for-developer-identity
. This command will be executed on the local machine using terraform's external
provider.
Misconfigured access to AWS Cognito Identity Pools can result in security vulnerabilities.
Ensure that all resources accessing the Cognito Identity Pool are restricted to the minimum necessary permissions.
It is crucial to properly manage IAM policies to limit access to only the required identity pools. Failing to do so may allow unintended services or instances to gain access to identity pools, posing a security risk.