Skip to content

UKHomeOffice/dq-tf-ad-test

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

27 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Active Directory Terraform Module

  • A version of the dq-tf-ad repository that is used to apply changes on the DQ AWS Test account
  • To update the repository (for equivalence to the live variant):
    • copy from dq-tf-ad
    • retain -test specific code
    • comment out unnecessary elements
    • ensure AMIs are accessible on Test account

Provides an Active Directory in a dedicated VPC that you can then peer with and consume.

Features

  • Automatically comes up in all the availability zones in your given region
  • Requires bare minimum ceremony of configuration to use
  • Provides an Ad Writer IAM Role which can be assigned to your AD manager instances
  • Sets up DHCP options on supplied VPCs
  • Encrypt the AD password with KMS

Usage

module "ad" {
  source = "github.com/ukhomeoffice/dq-tf-ad"
  peer_with = [
    "${aws_vpc.YOURVPC1.id}",
    "${aws_vpc.YOURVPC2.id}"
  ]
  peer_count   = 2
  subnets      = [
  "${aws_subnet.YOUSSUBNET1.id}",
  "${aws_subnet.YOUSSUBNET2.id}",
  ]
  subnet_count = 2
  Domain = {
    address = "mydomain.com"
    directoryOU = "OU=mydomain,DC=mydomain,DC=com"
  }
}

resource "aws_instance" "ad_writer" {
#...
  iam_instance_profile = "${module.ad.ad_writer_instance_profile_name}"
#...
}

resource "aws_ssm_association" "win" {
  name        = "${module.ad.ad_aws_ssm_document_name}"
  instance_id = "${aws_instance.ad_writer.id}"
}

Or a more complete example

Joining instances

New windows instances can be simply assigned the iam_instance_profile and it'll 'just work'.

For existing or linux you should login to an AD Writer instance and make a user with delegated permissions to.

For implementation see the ec2 instances in the explorative demo that preceeded this module where I hacked some instances to auto join by provisioning them with some user_data. Be warned though, adding even a restriced AD account password here is a really bad idea.

Keeping the AD Admin password in KMS

echo -n 'Sup3rS3cret' > plaintext-password
aws kms encrypt \
 --key-id YOUR_KEY_ID \
 --plaintext fileb://plaintext-password \
 --encryption-context terraform=active_directory \
 --output text --query CiphertextBlob
AQECA......P8dPp28OoAQ==
data "aws_kms_secret" "ad_admin_password" {
  secret {
    name    = "pass"
    payload = "AQECA......P8dPp28OoAQ=="

    context {
      terraform = "active_directory"
    }
  }
}

module "ad" {
  AdminPassword = "${data.aws_kms_secret.ad_admin_password.pass}"
}

Related reading

This module is based off the explorative work done in the dq-tf-ad-demo repository.

Contributions

Pull requests welcome!

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published