Skip to content

Commit 4c375c6

Browse files
committed
Merge branch 'tf-doc-update' of https://github.com/geekzter/azure-identity-scripts into tf-doc-update
2 parents b57a6fa + a10169e commit 4c375c6

File tree

1 file changed

+29
-1
lines changed
  • terraform/azure-devops/create-service-connection

1 file changed

+29
-1
lines changed

terraform/azure-devops/create-service-connection/README.md

Lines changed: 29 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,6 +51,14 @@ azdo_organization_url = "https://dev.azure.com/my-organization"
5151
azdo_project_name = "my-project"
5252
```
5353

54+
Pre-requisites:
55+
56+
- The user can create app registrations i.e.:
57+
- Creation of app registrations is not [disabled in Entra ID](https://learn.microsoft.com/entra/identity/role-based-access-control/delegate-app-roles#restrict-who-can-create-applications);
58+
or
59+
- The user is member of a privileged Entra ID role e.g. [Application Developer](https://learn.microsoft.com/entra/identity/role-based-access-control/permissions-reference#application-developer)
60+
- The user is an owner of the Azure subscription (so role assignment can be performed)
61+
5462
#### Managed Identity with Federated Identity Credential and custom RBAC
5563

5664
```hcl
@@ -76,6 +84,11 @@ create_managed_identity = true
7684
managed_identity_resource_group_id = "/subscriptions/11111111-1111-1111-1111-111111111111/resourceGroups/msi-rg"
7785
```
7886

87+
Pre-requisites:
88+
89+
- A resource group to hold the Managed Identity has been pre-created
90+
- The user is an owner of the Azure scopes so role assignment on
91+
7992
#### App registration with Federated Identity Credential and ITSM metadata
8093

8194
```hcl
@@ -89,6 +102,14 @@ entra_app_owner_object_ids = ["00000000-0000-0000-0000-000000000000","111111
89102
entra_service_management_reference = "11111111-1111-1111-1111-111111111111"
90103
```
91104

105+
Pre-requisites:
106+
107+
- The user can create app registrations i.e.:
108+
- Creation of app registrations is not [disabled in Entra ID](https://learn.microsoft.com/entra/identity/role-based-access-control/delegate-app-roles#restrict-who-can-create-applications);
109+
or
110+
- The user is member of a privileged Entra ID role e.g. [Application Developer](https://learn.microsoft.com/entra/identity/role-based-access-control/permissions-reference#application-developer)
111+
- The user is an owner of the Azure subscription (so role assignment can be performed)
112+
92113
#### App registration with short-lived secret and constrained RBAC
93114

94115
```hcl
@@ -105,6 +126,13 @@ create_federation = false
105126
create_managed_identity = false
106127
entra_secret_expiration_days = 0 # secret lasts 1 hour
107128
```
129+
Pre-requisites:
130+
131+
- The user can create app registrations i.e.:
132+
- Creation of app registrations is not [disabled in Entra ID](https://learn.microsoft.com/entra/identity/role-based-access-control/delegate-app-roles#restrict-who-can-create-applications);
133+
or
134+
- The user is member of a privileged Entra ID role e.g. [Application Developer](https://learn.microsoft.com/entra/identity/role-based-access-control/permissions-reference#application-developer)
135+
- The user is an owner of the Azure resource group (so role assignment can be performed)
108136

109137
## Terraform Configuration
110138

@@ -138,7 +166,7 @@ Generated with [terraform-docs](https://terraform-docs.io/).
138166
| <a name="input_azdo_creates_identity"></a> [azdo_creates_identity](#input_azdo_creates_identity) | Let Azure DevOps create identity for service connection | `bool` | `false` | no |
139167
| <a name="input_azure_role_assignments"></a> [azure_role_assignments](#input_azure_role_assignments) | Role assignments to create for the service connection's identity. If this is empty, the Contributor role will be assigned on the azurerm provider subscription. | `set(object({scope=string, role=string}))` | `[]` | no |
140168
| <a name="input_create_federation"></a> [create_federation](#input_create_federation) | Use workload identity federation instead of a App Registration secret | `bool` | `true` | no |
141-
| <a name="input_create_managed_identity"></a> [create_managed_identity](#input_create_managed_identity) | Creates a Managed Identity instead of a App Registration | `bool` | `true` | no |
169+
| <a name="input_create_managed_identity"></a> [create_managed_identity](#input_create_managed_identity) | Creates a Managed Identity instead of a App Registration | `bool` | `false` | no |
142170
| <a name="input_entra_app_notes"></a> [entra_app_notes](#input_entra_app_notes) | Description to put in the Entra ID app registration notes field | `string` | `null` | no |
143171
| <a name="input_entra_app_owner_object_ids"></a> [entra_app_owner_object_ids](#input_entra_app_owner_object_ids) | Object ids of the users that will be co-owners of the Entra ID app registration | `list(string)` | `null` | no |
144172
| <a name="input_entra_secret_expiration_days"></a> [entra_secret_expiration_days](#input_entra_secret_expiration_days) | Secret expiration in days | `number` | `90` | no |

0 commit comments

Comments
 (0)