Skip to content
This repository was archived by the owner on Oct 4, 2024. It is now read-only.
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions CODEOWNERS
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
* @davmayd
2 changes: 1 addition & 1 deletion docs/boilerplate
23 changes: 21 additions & 2 deletions templates/okta-asa-bastion.template.yaml
Original file line number Diff line number Diff line change
@@ -1,6 +1,10 @@
AWSTemplateFormatVersion: 2010-09-09
Description: This AWS CloudFormation template deploys a bastion host enrolled with Okta Advanced Server Access (qs-1rm280cl1)
Metadata:
cfn-lint:
config:
ignore_checks:
- W9006
LICENSE: Apache License, Version 2.0
QuickStartDocumentation:
EntrypointName: "Parameters for deploying Okta ASA into an existing VPC"
Expand Down Expand Up @@ -95,7 +99,6 @@ Metadata:
default: Root volume size
EnrollmentToken:
default: Okta Advanced Server Access enrollment token
cfn-lint: { config: { ignore_checks: [E9007] } }
Parameters:
EC2AMIOS:
AllowedValues:
Expand Down Expand Up @@ -456,6 +459,15 @@ Resources:
- !Sub 'arn:${AWS::Partition}:iam::aws:policy/CloudWatchAgentServerPolicy'
BastionHostPolicy:
Type: 'AWS::IAM::Policy'
Metadata:
cfn-lint:
config:
ignore_checks:
- EIAMPolicyWildcardResource
cfn_nag:
rules_to_suppress:
- id: W12
reason: "EC2 requires wildcard access"
Properties:
PolicyName: BastionPolicy
PolicyDocument:
Expand All @@ -481,7 +493,7 @@ Resources:
- Action:
- 'ec2:AssociateAddress'
- 'ec2:DescribeAddresses'
Resource: '*'
Resource: '*' # Only supported resource per the documentation
Effect: Allow
Roles:
- !If
Expand Down Expand Up @@ -702,6 +714,13 @@ Resources:
- 'Null'
BastionSecurityGroup:
Type: 'AWS::EC2::SecurityGroup'
Metadata:
cfn_nag:
rules_to_suppress:
- id: F1000
reason: "Standard Amazon practice"
- id: W36
reason: "Group description is sufficient"
Properties:
GroupDescription: Enables SSH Access to Bastion Hosts
VpcId: !Ref VPCID
Expand Down
5 changes: 4 additions & 1 deletion templates/okta-asa-main.template.yaml
Original file line number Diff line number Diff line change
@@ -1,6 +1,10 @@
AWSTemplateFormatVersion: 2010-09-09
Description: This AWS CloudFormation template deploys an environment – VPC, bastion, and target hosts – with Okta Advanced Server Access (qs-1rm280cig)
Metadata:
cfn-lint:
config:
ignore_checks:
- W9006
LICENSE: Apache License, Version 2.0
QuickStartDocumentation:
EntrypointName: "Parameters for deploying Okta ASA into a new VPC"
Expand Down Expand Up @@ -92,7 +96,6 @@ Metadata:
default: VPC CIDR
EnrollmentToken:
default: Okta Advanced Server Access enrollment token
cfn-lint: { config: { ignore_checks: [E9007] } }
Parameters:
AvailabilityZones:
Description: 'Availability Zones to use for the subnets in the VPC. The logical order is preserved. This deployment uses 2 Availability Zones.'
Expand Down
23 changes: 21 additions & 2 deletions templates/okta-asa-target.template.yaml
Original file line number Diff line number Diff line change
@@ -1,6 +1,10 @@
AWSTemplateFormatVersion: 2010-09-09
Description: This AWS CloudFormation template deploys a target host enrolled with Okta Advanced Server Access (qs-1rm280cl7)
Metadata:
cfn-lint:
config:
ignore_checks:
- W9006
LICENSE: Apache License, Version 2.0
AWS::CloudFormation::Interface:
ParameterGroups:
Expand Down Expand Up @@ -95,7 +99,6 @@ Metadata:
default: Root volume size
EnrollmentToken:
default: Okta Advanced Server Access enrollment token
cfn-lint: { config: { ignore_checks: [E9007] } }
Parameters:
BastionSecurityGroupID:
Description: ID of the bastion host security group to enable SSH connections (e.g.,
Expand Down Expand Up @@ -442,6 +445,15 @@ Resources:
- !Sub 'arn:${AWS::Partition}:iam::aws:policy/CloudWatchAgentServerPolicy'
TargetHostPolicy:
Type: 'AWS::IAM::Policy'
Metadata:
cfn-lint:
config:
ignore_checks:
- EIAMPolicyWildcardResource
cfn_nag:
rules_to_suppress:
- id: W12
reason: "EC2 requires wildcard access"
Properties:
PolicyName: TargetPolicy
PolicyDocument:
Expand All @@ -467,7 +479,7 @@ Resources:
- Action:
- 'ec2:AssociateAddress'
- 'ec2:DescribeAddresses'
Resource: '*'
Resource: '*' # Only supported resource per the documentation
Effect: Allow
Roles:
- !If
Expand Down Expand Up @@ -653,6 +665,13 @@ Resources:
[ $(qs_status) == 0 ] && cfn_success || cfn_fail
TargetSecurityGroup:
Type: 'AWS::EC2::SecurityGroup'
Metadata:
cfn_nag:
rules_to_suppress:
- id: F1000
reason: "Standard Amazon practice"
- id: W36
reason: "EC2 requires wildcard access"
Properties:
GroupDescription: Enables SSH Access to Target Hosts
VpcId: !Ref VPCID
Expand Down