Open jg-repos opened 5 months ago
Current workaround: attach the tokengen provider to the identity federation Module. Downside is the local client/OIDC client needs to have extra authorisations to configure OIDC.
module "azure_application_federated_identity_credential" {
source = "../modules/identity_federation"
depends_on = [module.azure_service_account]
for_each = tomap({ for t in local.oidc_subject : "${t.display_name}-${t.subject}" => t })
application_id = module.azure_service_account.application_id
display_name = each.value.display_name
subject = each.value.subject
providers = {
- azuread.auth_session = azuread.auth_session
+ azuread.auth_session = azuread.tokengen
}
}
Attempting to configure the service Account with identity federation credentials is failing when provisioning a new azuread provider and attaching to the identity federation Module.
Error
Example