Configuration in this directory creates an authorization group on the PubSub+ appliance, leveraging the Client Terraform module. The authorization group can be used for OAuth or LDAP authorization.
msg_vpn_name
- Set todefault
in the example.client_identifier_type
- Set toauthorization_group
.client_identifier_name
- Set tomyauthgroup
in the example.client_profile_name
- Set todefault
in the example.acl_profile_name
- Set todefault
in the example.
Optional module input variables have the same name as the attributes of the underlying provider resource. If omitted, then the default for the related resource attribute will be configured on the broker. For a list of attributes and the corresponding defaults, see the documentation of "solacebroker_msg_vpn_authorization_group".
The module default for the enabled
variable is true, which enables the authorization group.
The module authorization_group
output refers to the created authorization group.
This example will create the following resources:
solacebroker_msg_vpn_authorization_group
If you don't already have access to a broker, see the Developers page for options to get started.
The sample is available from the module GitHub repo:
git clone https://github.com/SolaceProducts/terraform-solacebrokerappliance-rest-delivery.git
cd examples/authorization-group
Adjust the provider parameters in main.tf
according to your broker. The example configuration shows settings for a local broker running in Docker.
Tip: You can verify configuration changes on the broker, before and after, using the PubSub+ Broker Manager Web UI.
Execute from this folder:
terraform init
terraform plan
terraform apply
Run terraform destroy
to clean up the created resources when they are no longer needed.
For more information, see Configuring Client Authorization section in the PubSub+ documentation.