You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Credentials can be provided through (in priority order):
17
+
17
18
- AWS Secrets Manager
18
19
- Provider attributes
19
20
- Environment variables
@@ -24,7 +25,7 @@ The provider uses the first available credentials source.
24
25
25
26
SAs simplify authentication by eliminating the need to create new Atlas-specific user identities and permission credentials. See [Service Accounts Overview](https://www.mongodb.com/docs/atlas/api/service-accounts-overview/) and [MongoDB Atlas Service Account Limits](https://www.mongodb.com/docs/manual/reference/limits/#mongodb-atlas-service-account-limits) for more information.
26
27
27
-
Create an SA in your [MongoDB Atlas organization](https://www.mongodb.com/docs/atlas/configure-api-access/#grant-programmatic-access-to-an-organization) and set the credentials, for example:
28
+
To use SA authentication, create an SA in your [MongoDB Atlas organization](https://www.mongodb.com/docs/atlas/configure-api-access/#grant-programmatic-access-to-an-organization) and set the credentials, for example:
28
29
29
30
```terraform
30
31
provider "mongodbatlas" {
@@ -33,13 +34,13 @@ provider "mongodbatlas" {
33
34
}
34
35
```
35
36
36
-
**Note:** SAs can't be used with `mongodbatlas_event_trigger` resources as its API doesn't support it yet.
37
+
**Note:** SAs can't be used with `mongodbatlas_event_trigger` resources because its API doesn't support it yet.
37
38
38
39
### Programmatic Access Key
39
40
40
-
Generate a PAK with the appropriate [role](https://docs.atlas.mongodb.com/reference/user-roles/). See [MongoDB Atlas documentation](https://www.mongodb.com/docs/atlas/configure-api-access-org/) for instructions.
41
+
Generate a PAK with the appropriate [role](https://docs.atlas.mongodb.com/reference/user-roles/). See the [MongoDB Atlas documentation](https://www.mongodb.com/docs/atlas/configure-api-access-org/) for detailed instructions.
41
42
42
-
**Role recommendation:** If unsure which role to grant, use an organization API key with the Organization Owner role to ensure sufficient access.
43
+
**Role recommendation:** If unsure which role to grant, use an organization API key with the Organization Owner role to ensure sufficient access as in the following example:
43
44
44
45
```terraform
45
46
provider "mongodbatlas" {
@@ -73,13 +74,15 @@ The provider supports retrieving credentials from AWS Secrets Manager. See [AWS
73
74
3.**Configure AWS credentials** (using AWS CLI or environment variables)
@@ -96,6 +99,7 @@ The provider supports retrieving credentials from AWS Secrets Manager. See [AWS
96
99
### Cross-Account and Cross-Region Access
97
100
98
101
For cross-account secrets, use the fully qualified ARN for `secret_name`. For cross-region or cross-account access, the `sts_endpoint` parameter is required, for example:
102
+
99
103
```terraform
100
104
provider "mongodbatlas" {
101
105
aws_access_key_id = var.aws_access_key_id
@@ -157,6 +161,7 @@ As per [HashiCorp's recommendations](https://developer.hashicorp.com/terraform/r
157
161
- Windows / AMD64
158
162
159
163
We ship binaries but do not prioritize fixes for the following operating system / architecture combinations:
0 commit comments