Skip to content

Commit e60ef41

Browse files
committed
Add pre-requisites
1 parent f8af2a7 commit e60ef41

File tree

2 files changed

+29
-1
lines changed

2 files changed

+29
-1
lines changed

terraform/azure-devops/create-service-connection/doc-gen/header.md

Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -50,6 +50,14 @@ azdo_organization_url = "https://dev.azure.com/my-organization"
5050
azdo_project_name = "my-project"
5151
```
5252

53+
Pre-requisites:
54+
55+
- The user can create app registrations i.e.:
56+
- Creation of app registrations is not [disabled in Entra ID](https://learn.microsoft.com/entra/identity/role-based-access-control/delegate-app-roles#restrict-who-can-create-applications);
57+
or
58+
- The user is member of a privileged Entra ID role e.g. [Application Developer](https://learn.microsoft.com/entra/identity/role-based-access-control/permissions-reference#application-developer)
59+
- The user is an owner of the Azure subscription (so role assignment can be performed)
60+
5361
#### Managed Identity with Federated Identity Credential and custom RBAC
5462

5563
```hcl
@@ -75,6 +83,11 @@ create_managed_identity = true
7583
managed_identity_resource_group_id = "/subscriptions/11111111-1111-1111-1111-111111111111/resourceGroups/msi-rg"
7684
```
7785

86+
Pre-requisites:
87+
88+
- A resource group to hold the Managed Identity has been pre-created
89+
- The user is an owner of the Azure scopes so role assignment on
90+
7891
#### App registration with Federated Identity Credential and ITSM metadata
7992

8093
```hcl
@@ -88,6 +101,14 @@ entra_app_owner_object_ids = ["00000000-0000-0000-0000-000000000000","111111
88101
entra_service_management_reference = "11111111-1111-1111-1111-111111111111"
89102
```
90103

104+
Pre-requisites:
105+
106+
- The user can create app registrations i.e.:
107+
- Creation of app registrations is not [disabled in Entra ID](https://learn.microsoft.com/entra/identity/role-based-access-control/delegate-app-roles#restrict-who-can-create-applications);
108+
or
109+
- The user is member of a privileged Entra ID role e.g. [Application Developer](https://learn.microsoft.com/entra/identity/role-based-access-control/permissions-reference#application-developer)
110+
- The user is an owner of the Azure subscription (so role assignment can be performed)
111+
91112
#### App registration with short-lived secret and constrained RBAC
92113

93114
```hcl
@@ -104,6 +125,13 @@ create_federation = false
104125
create_managed_identity = false
105126
entra_secret_expiration_days = 0 # secret lasts 1 hour
106127
```
128+
Pre-requisites:
129+
130+
- The user can create app registrations i.e.:
131+
- Creation of app registrations is not [disabled in Entra ID](https://learn.microsoft.com/entra/identity/role-based-access-control/delegate-app-roles#restrict-who-can-create-applications);
132+
or
133+
- The user is member of a privileged Entra ID role e.g. [Application Developer](https://learn.microsoft.com/entra/identity/role-based-access-control/permissions-reference#application-developer)
134+
- The user is an owner of the Azure resource group (so role assignment can be performed)
107135

108136
## Terraform Configuration
109137

terraform/azure-devops/create-service-connection/variables.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ variable create_federation {
3030

3131
variable create_managed_identity {
3232
description = "Creates a Managed Identity instead of a App Registration"
33-
default = true
33+
default = false
3434
type = bool
3535
}
3636

0 commit comments

Comments
 (0)