Skip to content

Static Credentials

Quick Start

Static credentials are the fastest way to get Terrateam working with AWS. You’ll create an AWS IAM user with programmatic access and store the credentials as GitHub secrets.

  1. Create a dedicated IAM user for Terrateam in your AWS account:

    Terminal window
    aws iam create-user --user-name terrateam
  2. Attach an IAM policy to give Terrateam the necessary permissions. We suggest PowerUserAccess as a starting point:

    Terminal window
    aws iam attach-user-policy \
    --policy-arn arn:aws:iam::aws:policy/PowerUserAccess \
    --user-name terrateam
  3. Generate access keys for the terrateam user:

    Terminal window
    aws iam create-access-key --user-name terrateam

    This command will output something like:

    {
    "AccessKey": {
    "UserName": "terrateam",
    "AccessKeyId": "AKIAIOSFODNN7EXAMPLE",
    "Status": "Active",
    "SecretAccessKey": "wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY"
    }
    }
  4. Add the AWS credentials as secrets to your GitHub repository:

    Terminal window
    # Set your repository (replace with your actual org/repo)
    export REPO="your-org/your-repo"
    # Create the AWS Access Key ID secret
    gh secret --repo "$REPO" set AWS_ACCESS_KEY_ID
    # Create the AWS Secret Access Key secret
    gh secret --repo "$REPO" set AWS_SECRET_ACCESS_KEY

    When prompted, paste the corresponding values from step 3.

Now that you have AWS authentication configured, you are now able to use Terrateam for plan and apply operations against AWS resources.