diff --git a/README.md b/README.md
index 6a5da0b..66501e9 100644
--- a/README.md
+++ b/README.md
@@ -209,6 +209,7 @@ Available targets:
| [vpc\_id](#input\_vpc\_id) | VPC ID that the AWS Transfer Server will be deployed to | `string` | `null` | no |
| [vpc\_security\_group\_ids](#input\_vpc\_security\_group\_ids) | A list of security groups IDs that are available to attach to your server's endpoint. If no security groups are specified, the VPC's default security groups are automatically assigned to your endpoint. This property can only be used when endpoint\_type is set to VPC. | `list(string)` | `[]` | no |
| [zone\_id](#input\_zone\_id) | Route53 Zone ID to add the CNAME | `string` | `""` | no |
+| [pre_authentication\_login\_banner](#input\_pre_authentication\_login\_banner) | Pre authentication login banner to add the display banner | `string` | `""` | no |
## Outputs
diff --git a/docs/terraform.md b/docs/terraform.md
index 481df36..1017aa8 100644
--- a/docs/terraform.md
+++ b/docs/terraform.md
@@ -79,6 +79,8 @@
| [vpc\_id](#input\_vpc\_id) | VPC ID that the AWS Transfer Server will be deployed to | `string` | `null` | no |
| [vpc\_security\_group\_ids](#input\_vpc\_security\_group\_ids) | A list of security groups IDs that are available to attach to your server's endpoint. If no security groups are specified, the VPC's default security groups are automatically assigned to your endpoint. This property can only be used when endpoint\_type is set to VPC. | `list(string)` | `[]` | no |
| [zone\_id](#input\_zone\_id) | Route53 Zone ID to add the CNAME | `string` | `""` | no |
+| [pre_authentication\_login\_banner](#input\_pre_authentication\_login\_banner) | Pre authentication login banner to add the display banner | `string` | `""` | no |
+
## Outputs
diff --git a/main.tf b/main.tf
index 411ce20..debd5b4 100644
--- a/main.tf
+++ b/main.tf
@@ -16,14 +16,14 @@ data "aws_s3_bucket" "landing" {
resource "aws_transfer_server" "default" {
count = local.enabled ? 1 : 0
- identity_provider_type = "SERVICE_MANAGED"
- protocols = ["SFTP"]
- domain = var.domain
- endpoint_type = local.is_vpc ? "VPC" : "PUBLIC"
- force_destroy = var.force_destroy
- security_policy_name = var.security_policy_name
- logging_role = join("", aws_iam_role.logging[*].arn)
-
+ identity_provider_type = "SERVICE_MANAGED"
+ protocols = ["SFTP"]
+ domain = var.domain
+ endpoint_type = local.is_vpc ? "VPC" : "PUBLIC"
+ force_destroy = var.force_destroy
+ security_policy_name = var.security_policy_name
+ logging_role = join("", aws_iam_role.logging[*].arn)
+ pre_authentication_login_banner = var.pre_authentication_login_banner
dynamic "endpoint_details" {
for_each = local.is_vpc ? [1] : []
diff --git a/variables.tf b/variables.tf
index 6945740..0a6cc3a 100644
--- a/variables.tf
+++ b/variables.tf
@@ -122,3 +122,10 @@ variable "eip_enabled" {
description = "Whether to provision and attach an Elastic IP to be used as the SFTP endpoint. An EIP will be provisioned per subnet."
default = false
}
+
+
+variable "pre_authentication_login_banner" {
+ type = string
+ description = "This is pre authentication login banner while connectimg to server"
+ default = "This system is for the use of authorized Appzen users only."
+}
\ No newline at end of file