You can configure Digger to use different accounts for
Storing digger specific PR-level locks
Terraform backend configuration
The target infra to plan / apply.
These all can even be different cloud providers - eg digger locks in AWS, state backend in Azure, while managing infra on GCP.We rely on terraform expecting particular environment variables when authorising with cloud providers.Let’s consider example where
Digger locks are in one aws account
Terraform state backend in another aws account
Infra is on Azure, terraform is using Managed Service Identity for auth