-
Notifications
You must be signed in to change notification settings - Fork 9.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Client VPN Endpoint - Add Federated Authentication #13401
Comments
I'm getting the issue
|
Hi, |
@lanejlanej It seems to be in CloudFormation, specifically the AWS::EC2::ClientVpnEndpoint ClientAuthenticationRequest If that works then when this is implemented you can import the resources into your state without affecting anything. Note I've never done the above but I hope that's helpful to get you started on a workaround. |
Hi Steve, |
Hi any idea on the ETA for this? Need it for a project I'm working on right now. |
Terraform has unfortunately been MIA regarding the pull requests... I addressed comments for the original PR over 3 weeks ago and not a peep from terraform. |
That's a bummer. I assumed Terraform was super responsive wrt adding support for new functionality. :( |
@maryelizbeth @bflad @gdavison @anGie44 @breathingdust @ksatirli can someone please tell me what needs to be done to get #14171 merged? That PR appears to address the concerns of related to this issue. That PR has been open for over a month without seemingly even a glance from any maintainers of this project... I would love to hear something, anything from Hashicorp for how to get attention to community provided PRs. |
That's great, thank you! |
In the meantime, I've been able to use local values to define the ################
# Locals
################
locals {
stack = {
Resources = merge(local.endpoint)
Outputs = {
"clientVpnId" = {
Description = "Client VPN ID",
Value = {
Ref = "endpoint${replace(var.vpc_id, "-", "")}"
}
}
}
}
endpoint = {
"endpoint${replace(var.vpc_id, "-", "")}" = {
Type = "AWS::EC2::ClientVpnEndpoint"
Properties = {
AuthenticationOptions = [
{
Type = "federated-authentication"
FederatedAuthentication = {
SAMLProviderArn = var.saml_provider_arn
}
}
]
ClientCidrBlock = var.clientCidr
ConnectionLogOptions = {
Enabled = var.endpoint_logging
CloudwatchLogGroup = aws_cloudwatch_log_group.client_vpn.name
}
Description = "Client VPN Endpoint via Federated AuthN"
ServerCertificateArn = aws_acm_certificate.server.arn
TransportProtocol = var.transport_protocol
SplitTunnel = var.split_tunnel
SecurityGroupIds = [
aws_security_group.cvpn_sg.id
]
VpcId = var.vpc_id
}
}
}
################
# CloudFormation
################
resource "aws_cloudformation_stack" "client_vpn" {
name = "client-vpn"
template_body = jsonencode(local.stack)
}
|
It's kind of funny that we need to use CloudFormation for this - it used to be when Terraform implemented features first, now it's CloudFormation and Terraforms lags behind and features are sorted out by 👍s. |
As per @bflad's comment above could everyone in here please upvote @jgeurts's MR #14171 so we really make sure it bubbles up in the priority merge list? Thank you. |
This has been released in version 3.5.0 of the Terraform AWS provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template for triage. Thanks! |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. Thanks! |
Community Note
Description
This request asks for the ability to add federated authentication (authN) as an authentication option for a Client VPN (CVPN) endpoint.
Based on the release by AWS today (5/19/20), federated authN is now supported by AWS CVPN. Until now, CVPN only supported AD and Mutual authN.
New or Affected Resource(s)
aws_ec2_client_vpn_endpoint:
Potential Terraform Configuration
References
https://aws.amazon.com/about-aws/whats-new/2020/05/aws-client-vpn-supports-federated-authentication-via-saml-2/
https://aws.amazon.com/blogs/networking-and-content-delivery/authenticate-aws-client-vpn-users-with-saml/
The text was updated successfully, but these errors were encountered: