-
Notifications
You must be signed in to change notification settings - Fork 300
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Resource for Azure_application_Client secrets #95
Comments
I'm having the same issue. The client secret seems to exist because I can use the service principal, but it does not appear in the UI for some reason. I believe #66 is related? |
Hi @kgopi05, Could you possibly need to use the |
App secrets are just passwords acording to the API:
|
It is partially displaying now. This code outputs the client secret to the command line. Also, the date says: "12/31/2019" instead of 01/01/2020.
|
@opticyclic that's the reason I named it "not_so_secret_anymore" :) You could use local exec resource to silently generate password and then use the azuread_application_password password output which is marked as secret. |
I'm more concerned with the fact that it doesn't automate the manual steps I am doing in the portal. |
@opticyclic what do you mean ? It doesnt show "masked" values as this is coming straight from the API but otherwise works exactly the same. |
Wouldnt it be better to use Is there any fix for this not showing in the portal? |
Hi All, Are there any break change recently about ressource azuread_application_password? I can't create anymore new one.
I use TF 12.10 and Azure Ad Provider 3.1 and Azure RM 1.35. Thanks |
Im trying to wrap my head around setting up client id and client secret in terraform using.
It doesn't appear to produce a client ID and client secret. How do I use the password generated for a aks deployment.
|
resource "random_uuid" "default" {}
resource "azuread_application" "default" {
name = "aks-${random_uuid.default.result}"
available_to_other_tenants = false
oauth2_allow_implicit_flow = false
}
resource "random_password" "default" {
length = 33
special = true
}
resource "azuread_application_password" "default" {
application_object_id = azuread_application.default.id
value = random_password.default.result
end_date = "2040-01-01T01:02:03Z"
}
resource "azuread_service_principal" "default" {
application_id = azuread_application.default.application_id
tags = []
} Then in AKS: service_principal {
client_id = azuread_service_principal.default.application_id
client_secret = random_password.default.result
} |
@JayDoubleu Thanks I'll give it a try. |
The advice I found here got my password created, being unable to set the description is a annoyance. Any advice on how I could look up the password? I have one terraform config to create base resources including the app registration and password. I'd like to look this password up from another terraform config to create a logic app connector and provide it the password but not sure how to store and retrieve it. I can see the password in the state file but azuread_application_password does not provide a data source. Each logic app could have it's own secret but given I cannot set the description I can't tell which one belongs to what so not much point. |
@andrew-sumner I store the secret created in key-vault and retrieve it from there.. you can also create a data from backend config and just pull the secret from an output.. |
@ronnie-webb A big thanks for that - solution was obvious in hindsight as these things often are but you saved me a lot of head-scratching. |
This has been released in version 0.10.0 of the provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. As an example: provider "azuread" {
version = "~> 0.10.0"
}
# ... other configuration ... |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. If you feel I made an error 🤖 🙉 , please reach out to my human friends 👉 hashibot-feedback@hashicorp.com. Thanks! |
How to provision the Azure_application_Client secrets using the Terraform ?
Tried provisioning azuread_service_principal_password , but it is not provisioning the Client secrets.
Regards
Gopi
The text was updated successfully, but these errors were encountered: