Skip to content

Static Credentials

Quick Start

Static credentials are the fastest way to get Terrateam working with AWS. You’ll create an AWS IAM user with programmatic access and store the credentials as GitHub secrets.

Setup Steps

  1. Create an IAM User

    Create a dedicated IAM user for Terrateam in your AWS account:

    Terminal window
    aws iam create-user --user-name terrateam
  2. Attach Permissions Policy

    Attach an IAM policy to give Terrateam the necessary permissions. We suggest PowerUserAccess as a starting point:

    Terminal window
    aws iam attach-user-policy \
    --policy-arn arn:aws:iam::aws:policy/PowerUserAccess \
    --user-name terrateam
  3. Create Access Keys

    Generate access keys for the terrateam user:

    Terminal window
    aws iam create-access-key --user-name terrateam

    This command will output something like:

    {
    "AccessKey": {
    "UserName": "terrateam",
    "AccessKeyId": "AKIAIOSFODNN7EXAMPLE",
    "Status": "Active",
    "SecretAccessKey": "wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY"
    }
    }
  4. Set GitHub Secrets

    Add the AWS credentials as secrets to your GitHub repository:

    Terminal window
    # Set your repository (replace with your actual org/repo)
    export REPO="your-org/your-repo"
    # Create the AWS Access Key ID secret
    gh secret --repo "$REPO" set AWS_ACCESS_KEY_ID
    # Create the AWS Secret Access Key secret
    gh secret --repo "$REPO" set AWS_SECRET_ACCESS_KEY

    When prompted, paste the corresponding values from step 3.

Security Considerations

Next Steps

Now that you have AWS authentication configured, you are now able to use Terrateam for plan and apply operations against AWS resources.