AWS EKS - kubernetes project and terraform module
-
Updated
Oct 17, 2025 - HCL
OpenID connect (OIDC) is an authentication layer on top of the OAuth 2.0 authorization framework. Beside SAML it’s widely known for being used as a single sign-on method. It uses REST and JSON for communication with the identity provider.
AWS EKS - kubernetes project and terraform module
Terraform module to configure GitHub Actions as an OpenID Connect (OIDC) identity provider in AWS.
Terraform module to setup OIDC with AWS and GH Actions
A sample showing how to configure Azure DevOps Workload identity federation (OIDC) connection to Azure with Terraform and then use that configuration to deploy resources with Terraform. The sample also demonstrates bootstrapping CI / CD with Terraform and how to implement a number of best practices.
Terraform module to configure Vault for GitHub OIDC authentication from Action runners.
A custom Service Provider Interface (extension) for Keycloak that supports SMART on FHIR EHR-Launch.
Configuration as code for an Intune-managed, cloud-native Azure Virtual Desktop service provisioned through Terraform. Also: fully password-less.
Terraform configuration to setup cloud resources on Azure, AWS and Google Cloud for OIDC on GitHub Enterprise Server.
Terraform module to configure GitLab Runner as an IAM OIDC identity provider in AWS
Keyless Google Cloud Access from HCP Terraform
Buffalo Kubernetes/CNCF Meetup, Kube Cluster
Production-ready Terraform + Azure Infrastructure as Code (IaC) with modular design, remote backend, and automated GitHub Actions CI/CD pipelines for Dev → QA → Test → UAT → Prod environments using OIDC authentication.
Couper OIDC Gateway
A comprehensive collection of reusable Terraform modules for Azure resources, designed to simplify infrastructure provisioning and promote best practices.
This repo demonstrates how to fetch secrets from Azure Key Vault using the Kubernetes External Secrets operator. It leverages OIDC authentication and Azure Workload Identity to securely access the vault from within a Kubernetes cluster. The implementation uses K3d, OpenTofu, and Terragrunt for infrastructure provisioning, showcasing GitOps practice
Example Terraform configurations