Implementation Summary
Glean provides customers with a Terraform module to execute. This Terraform module creates the managed policies that get attached to roles as permission boundaries.You must use the permission boundary policies that that are supplied by Glean. These must have the ARNs that are created by the Terraform. You have the ability to create these yourself, but they must use the policy that is provided by Glean.
The Permission Boundaries
Glean can provision 2 permission boundaries. They are:- The Orchestration Role Boundary
- ARN:
arn:aws:iam::GLEAN-ACCOUNT-ID:policy/glean/perm-boundary/glean-OrchestrationRolePermBoundary
- ARN:
- The Application Role Boundary
- ARN:
arn:aws:iam::GLEAN-ACCOUNT-ID:policy/glean/perm-boundary/glean-ApplicationRolePermBoundary
- ARN:
- IAM role creation/mutation
- IAM
PassRole
Glean requires the IAM role ARNs above for these managed policies to be the same as depicted.
Set up
New Customers
New customers have the option to have this automatically provisioned during the initial deploy. Glean will provide the customer with the sample SCP to apply, and the customer would apply it to the account.Existing Customers
For existing customers, please contact your Glean representative for the Terraform package. Once you receive this, you will:- Make adjustments to set the Terraform backend
- Update
tfvars
files (you will need to update the region to be that of the Glean deployment) - Run the Terraform
- Inform the Glean representative that this has been completed
- Glean will perform a deployment operation that will attach the permission boundaries everywhere
- Customers will set up the SCP as appropriate