Virtual Mfa Device
Provides an IAM Virtual MFA Device.
Note: All attributes will be stored in the raw state as plain-text. Note: A virtual MFA device cannot be directly associated with an IAM User from the provider. To associate the virtual MFA device with a user and enable it, use the code returned in either
base_32_string_seed
orqr_code_png
to generate TOTP authentication codes. The authentication codes can then be used with the AWS CLI commandaws iam enable-mfa-device
or the AWS API callEnableMFADevice
.
Example Usage
Using certs on file:
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.aws.iam.VirtualMfaDevice;
import com.pulumi.aws.iam.VirtualMfaDeviceArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var example = new VirtualMfaDevice("example", VirtualMfaDeviceArgs.builder()
.virtualMfaDeviceName("example")
.build());
}
}
Content copied to clipboard
Import
Using pulumi import
, import IAM Virtual MFA Devices using the arn
. For example:
$ pulumi import aws:iam/virtualMfaDevice:VirtualMfaDevice example arn:aws:iam::123456789012:mfa/example
Content copied to clipboard
Properties
Link copied to clipboard
The base32 seed defined as specified in RFC3548. The base_32_string_seed
is base64-encoded.
Link copied to clipboard