Skip to content

Latest commit

 

History

History

authorization-group

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 
 
 

Authorization Group Configuration Example

Configuration in this directory creates an authorization group on the PubSub+ event broker, leveraging the Client Terraform module. The authorization group can be used for OAuth or LDAP authorization.

Module Configuration in the Example

Required Inputs

  • msg_vpn_name - Set to default in the example.
  • client_identifier_type - Set to authorization_group.
  • client_identifier_name - Set to myauthgroup in the example.
  • client_profile_name - Set to default in the example.
  • acl_profile_name - Set to default in the example.

Optional Inputs

Optional module input variables have the same name as the attributes of the underlying provider resource. If omitted, then the default for the related resource attribute will be configured on the broker. For a list of attributes and the corresponding defaults, see the documentation of "solacebroker_msg_vpn_authorization_group".

The module default for the enabled variable is true, which enables the authorization group.

Output

The module authorization_group output refers to the created authorization group.

Created Resources

This example will create the following resources:

  • solacebroker_msg_vpn_authorization_group

Running the Example

Access to a PubSub+ Event Broker

If you don't already have access to a broker, see the Developers page for options to get started.

Sample Source Code

The sample is available from the module GitHub repo:

git clone https://github.com/SolaceProducts/terraform-solacebroker-rest-delivery.git
cd examples/authorization-group

Adjust the Provider Configuration

Adjust the provider parameters in main.tf according to your broker. The example configuration shows settings for a local broker running in Docker.

Create the Resource

Tip: You can verify configuration changes on the broker, before and after, using the PubSub+ Broker Manager Web UI.

Execute from this folder:

terraform init
terraform plan
terraform apply

Run terraform destroy to clean up the created resources when they are no longer needed.

Additional Documentation

For more information, see Configuring Client Authorization section in the PubSub+ documentation.