

# ec2-client-vpn-not-authorize-all
<a name="ec2-client-vpn-not-authorize-all"></a>

Checks if the AWS Client VPN authorization rules authorizes connection access for all clients. The rule is NON\$1COMPLIANT if 'AccessAll' is present and set to true. 



**Identifier:** EC2\$1CLIENT\$1VPN\$1NOT\$1AUTHORIZE\$1ALL

**Resource Types:** AWS::EC2::ClientVpnEndpoint

**Trigger type:** Periodic

**AWS Region:** All supported AWS regions except Asia Pacific (New Zealand), China (Beijing), Asia Pacific (Thailand), Asia Pacific (Jakarta), Middle East (UAE), Asia Pacific (Hyderabad), Asia Pacific (Osaka), Asia Pacific (Malaysia), Asia Pacific (Melbourne), AWS GovCloud (US-East), AWS GovCloud (US-West), Mexico (Central), Israel (Tel Aviv), Asia Pacific (Taipei), Canada West (Calgary), Europe (Spain), China (Ningxia), Europe (Zurich) Region

**Parameters:**

None  

## AWS CloudFormation template
<a name="w2aac20c16c17b7d537c19"></a>

To create AWS Config managed rules with AWS CloudFormation templates, see [Creating AWS Config Managed Rules With AWS CloudFormation Templates](aws-config-managed-rules-cloudformation-templates.md).