Skip to main content
In this lesson, we’ll dive into Terragrunt’s iam_role attribute, which tells Terraform to assume an AWS IAM role before executing any commands. Leveraging an IAM role helps enforce least privilege, centralize credential management, and maintain clear audit trails for your infrastructure changes.
The image illustrates "iam_role and Related Attributes," featuring icons for Terraform commands and AWS Identity and Access Management (IAM), with a focus on "Purpose."

Key IAM Role Attributes

AttributeDescriptionRequired / Default
iam_roleThe Amazon Resource Name (ARN) of the IAM role that Terragrunt will assume.Required
aws_profileThe name of the AWS CLI profile to source credentials from. Falls back to default/profile.Optional
iam_assume_role_durationSession duration (in seconds) for the assumed role.Optional (default: 3600 seconds)
iam_assume_role_session_nameCustom session name for auditing and logging purposes when assuming the role.Optional
Be careful when extending the iam_assume_role_duration. While longer sessions reduce the frequency of re-authentication, they also increase the window of risk if credentials are compromised.
The image shows a diagram related to "iam_role and Related Attributes," featuring two attributes: "iam_assume_role_duration" and "iam_assume_role_session_name," with a section labeled "Considerations" below.

Troubleshooting: Missing Permissions

If you omit iam_role and your AWS user doesn’t have direct permissions, running terragrunt apply will fail with an AccessDenied error:
terraform {
  source = "tfr://terraform-aws-modules/vpc/aws/?version=5.8.1"
}

include "root" {
  path   = find_in_parent_folders()
  expose = true
}

inputs = {
  name = "KodeKloud-VPC"
  cidr = "10.100.0.0/16"
}

download_dir    = "../.terragrunt-kodekloud"
prevent_destroy = false
skip            = false
$ terragrunt apply
Error: AccessDenied: User is not authorized to perform: ec2:CreateVpc

Enabling IAM Role Assumption

  1. Create or identify an IAM role—for example,
    arn:aws:iam::654654587009:role/terragrunt-role—with the necessary permissions.
  2. Add the iam_role attribute to your Terragrunt configuration:
terraform {
  source = "tfr://terraform-aws-modules/vpc/aws/?version=5.8.1"
}

include "root" {
  path   = find_in_parent_folders()
  expose = true
}

inputs = {
  name = "KodeKloud-VPC"
  cidr = "10.100.0.0/16"
}

download_dir    = "../.terragrunt-kodekloud"
prevent_destroy = false
skip            = false

iam_role = "arn:aws:iam::654654587009:role/terragrunt-role"
  1. Run the apply command:
terragrunt apply
Terragrunt will first assume the specified role, then execute Terraform:
Plan: 4 to add, 0 to change, 0 to destroy.

Do you want to perform these actions?
  Terraform will perform the actions described above.
  Only 'yes' will be accepted to approve.

Enter a value: yes

aws_vpc.this[0]: Creating...
...
Apply complete! Resources: 4 added, 0 changed, 0 destroyed.
By specifying iam_role, you restrict deployments to users who can assume the designated role—aligning with AWS security best practices for auditable, least-privilege operations.

References