Open eduhamel opened 1 year ago
From what we've seen, it's also impossible to configure Windows-Autopilot-specific auth policy rules due to the lack of a suitable client
argument in the okta_app_signon_policy_rule
resource:
I think this one will benefit when we bring better Okta Integration Network app support into the API
Other issues having touches on OIN: https://github.com/okta/terraform-provider-okta/issues/1304 https://github.com/okta/terraform-provider-okta/issues/1342
Okta Internal Reference: https://oktainc.atlassian.net/browse/OKTA-552937
Also, I'm told last week, from the 15th to the 17th, there was a greater issue with the office365 app across the Okta service, see: https://status.okta.com/#incident/a9C4z000000Yzi5EAC @eduhamel can you try running your config again?
This is not related to the office365 issue that occurred last week, I just tested it again.
Le mar. 29 nov. 2022 à 17:22, Mike Mondragon @.***> a écrit :
Also, I'm told last week, from the 15th to the 17th, there was a greater issue with the office365 app across the Okta service, see: https://status.okta.com/#incident/a9C4z000000Yzi5EAC @eduhamel https://github.com/eduhamel can you try running your config again?
— Reply to this email directly, view it on GitHub https://github.com/okta/terraform-provider-okta/issues/1387#issuecomment-1330906591, or unsubscribe https://github.com/notifications/unsubscribe-auth/ATCHKD7TZOJHM63FLRDAVXTWKYUV5ANCNFSM6AAAAAASNCTHRA . You are receiving this because you were mentioned.Message ID: @.***>
--
Etienne Duhamel
Consultant Cybersécurité
https://www.facebook.com/SynetisFR/ https://fr.linkedin.com/company/synetis https://twitter.com/SYNETIS?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor
@.***
M : +33 (0)7 64 46 85 78 Tél :+33 1 47 64 48 66
www.synetis.com | 19 rue du Général Foy, 75008 Paris
This issue is stale because it has been open 60 days with no activity. Remove stale label or comment or this will be closed in 5 days
not stale
I'm also running into this, the inability to set the attribute below via terraform means that any 2fa config in your sign-on policy resources gets wiped out on apply, but without an error.
Apply complete! Resources: 0 added, 1 changed, 0 destroyed.
is the response I get with the following constraints configured:
constraints = {
knowledge = {
reauthenticateIn = "PT2H"
types = ["password", ]
},
possession = {
deviceBound = "REQUIRED"
hardwareProtection = "REQUIRED"
}
}
but the UI shows this is not configured
This is the missing attribute that I can set via the API to successfully configure these rules outside of the UI.
"office365Client": {
"include": [
"WEB"
]
}
This issue is stale because it has been open 60 days with no activity. Remove stale label or comment or this will be closed in 5 days
not stale
This issue is stale because it has been open 60 days with no activity. Remove stale label or comment or this will be closed in 5 days
not stale
not stale
not stale
Bumping issues to ward off StaleBot
should no longer be required
If the Stale
Label isn't on the issue, it shouldn't get closed out
See the following PRs for reference 🙂
https://github.com/okta/terraform-provider-okta/pull/1697
https://github.com/okta/terraform-provider-okta/pull/1688
this means that we can now all follow the community notice and keep issue comments clean and on-topic 😃
Please do not leave "+1" or other comments that do not add relevant new information or questions, they generate extra noise for issue followers and do not help prioritize the request
This is exposed in the API @monde, specifically, it's stored in the conditions.office365Client.include
signon rule attribute.
However, it doesn't appear to be in the Go SDK, which is a blocker for adding it to the provider.
Updating a policy rule through Terraform clears the value. We've been using a script to keep it set to the desired value (along with the device assurance policy attribute before that was released in v4.2.0), but that approach is increasingly problematic since the Python SDK is pretty far behind because it hasn't been updated for the v3 API (ie we just broke it with Chrome Device Trust policies).
Example M365 rule retrieved via API:
{
"id": "rul68xxx",
"status": "ACTIVE",
"name": "<Name>",
"priority": 3,
"created": "2023-06-30T18:58:01.000Z",
"lastUpdated": "2023-10-11T21:35:42.000Z",
"system": false,
"conditions": {
"people": {
"users": {
"exclude": []
}
},
"network": {
"connection": "ANYWHERE"
},
"device": {
"registered": true,
"managed": true
},
"riskScore": {
"level": "ANY"
},
"elCondition": {
"condition": "<endpoint integration>"
},
"userType": {
"include": [],
"exclude": []
},
"office365Client": {
"include": [
"MODERN_AUTH",
"WEB"
]
}
}
}
@eduhamel the Okta API is rolling out EA access for configuring an O365 OIN app (and other OIN apps) via the Okta API in November/December. I believe it will be GA in January. Once that is deployed we'll be able to generate an okta-sdk-golang that the terraform provider uses to communicate with the API and 100% support the office 365 OIN app in terraform.
cc: @duytiennguyen-okta @jefftaylor-okta
OKTA internal reference https://oktainc.atlassian.net/browse/OKTA-658283
Can anyone provide an update on this issue? It's been 11 months since the internal ticket was created and there is no indication of a timeline to resolution.
Community Note
Description
Office 365-specific policy rule cannot be properly configured as the office365Client attribute is not available nor retrieved.
New or Affected Resource(s)
Potential Terraform Configuration
References
0000