OpenVPN Portal is a web application. It authenticates users by their Google account and generates an OpenVPN profile for them.
You would put the OpenVPN server in a public subnet in your AWS cloud to give access to authorized users to AWS resources in private subnets.
The OpenVPN Portal is a Web application deployed as an AWS ECS service. It talks to Google to authenticate users and distributes OpenVPN profiles needed to configure a client application.
Normally, the module will create about 80 resources. In my case, all of them start with a "module.vnp", which is a good indicator Terraform will create resources that we expect it to do. If your plan includes resources to be changed or destroyed - double-check the STDOUT to understand what's going on.
Now if you open https://openvpn-portal.infrahouse.com/ in a browser, you'll see a 502 error. It's because I didn't update Google Client credentials. So, let's remedy that.