aws-auth ConfigMap as the primary mechanism for granting IAM principals access to a cluster. Access entries are managed through the EKS API and can be created, updated, and deleted at any time.
Authentication Modes
Theauthentication_mode variable controls how the cluster authenticates principals.
| Value | Behavior |
|---|---|
API_AND_CONFIG_MAP (default) | Both the EKS access entry API and the aws-auth ConfigMap are active |
API | Only the access entry API is used. aws-auth ConfigMap is ignored |
CONFIG_MAP | Legacy mode. Only aws-auth ConfigMap is used |
When
authentication_mode is API_AND_CONFIG_MAP or API, EKS automatically creates access entries for the IAM roles used by EKS managed node groups and Fargate profiles. For self-managed node groups, the module creates the access entry automatically on your behalf.Cluster Creator Admin Permissions
Setenable_cluster_creator_admin_permissions = true to automatically grant the IAM identity running Terraform full administrator access to the cluster via an access entry. This can be enabled or disabled at any time.
This module hard-codes
bootstrap_cluster_creator_admin_permissions = false in the EKS cluster resource. That AWS-level setting is only applied at cluster creation and cannot be changed. enable_cluster_creator_admin_permissions achieves the same result through an access entry, which can be toggled at any time.Access Entry Types
Each access entry has atype that determines what kind of principal it represents.
| Type | Description |
|---|---|
STANDARD (default) | IAM user or role granted Kubernetes RBAC permissions via policy associations |
EC2_LINUX | IAM role used by EC2 Linux nodes (self-managed node groups) |
FARGATE_LINUX | IAM role used by Fargate profiles |
HYBRID_LINUX | IAM role used by EKS Hybrid nodes |
Configuring Access Entries
Theaccess_entries variable accepts a map where each key is a logical name for the entry.
Standard Access Entry with Policy Association
Grant an IAM role view access to a specific namespace:Cluster-Wide Admin Access
Grant an IAM role cluster-wide admin access:Multiple Policy Associations
A single access entry can have multiple policy associations:Hybrid Node Access Entry
For EKS Hybrid nodes, usetype = "HYBRID_LINUX" and reference the hybrid node IAM role:
Available EKS Access Policies
AmazonEKSClusterAdminPolicy
Full administrator access across the entire cluster. Equivalent to the
cluster-admin ClusterRole.AmazonEKSAdminPolicy
Admin access within a namespace or cluster scope. Can manage most resources but not cluster-level resources like nodes.
AmazonEKSEditPolicy
Read/write access to most namespaced resources. Cannot manage roles or role bindings.
AmazonEKSViewPolicy
Read-only access to most namespaced resources.
arn:aws:eks::aws:cluster-access-policy/<PolicyName>
Access Entries with Managed Node Groups
Whenauthentication_mode is API_AND_CONFIG_MAP or API, EKS automatically creates an access entry for the IAM role of each EKS managed node group. No additional configuration is needed in the access_entries variable for managed node groups.
For self-managed node groups, this module automatically creates the required EC2_LINUX access entry:
