Skip to content

Commit a90a083

Browse files
authored
Revise README for Entra ID Terraform template
Updated README to clarify the purpose of the Terraform template and modified initialization instructions.
1 parent 30f872b commit a90a083

1 file changed

Lines changed: 15 additions & 21 deletions

File tree

4_identity-security/entra_id/README.md

Lines changed: 15 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Terraform Template - Microsoft Entra ID (Entra ID)
1+
# Terraform Template - Microsoft Entra ID (App)
22

33
Costa Rica
44

@@ -9,12 +9,15 @@ Last updated: 2026-02-03
99

1010
------------------------------------------
1111

12-
> High level: creates a Microsoft Entra ID application registration (tenant-level). Optionally creates a service principal, a client secret, and (optionally) assigns an Azure RBAC role at a provided scope.
13-
14-
> High level: creates a Microsoft Entra ID application registration (tenant-level). Optionally creates a service principal and a client secret.
12+
> This template contains Terraform configurations to create and manage a Microsoft Entra ID application registration (tenant-level). Optionally creates a service principal, a client secret, and (optionally) assigns an Azure RBAC role at a provided scope.
1513
14+
> [!NOTE]
1615
> No Azure resource group is required unless you choose a resource-group RBAC scope (because the RG must already exist for role assignment).
1716
17+
<img width="1898" height="987" alt="image" src="https://github.com/user-attachments/assets/0bb658e3-a617-4132-8d99-c2bd4efe38ca" />
18+
19+
<img width="1326" height="768" alt="image" src="https://github.com/user-attachments/assets/b219e1fd-7c1e-4265-9f71-2bc559af1694" />
20+
1821
## File Descriptions
1922

2023
- **main.tf**: Creates the application registration, optional service principal, and optional client secret.
@@ -46,36 +49,27 @@ Below is a list of variables used in this template, their expected values, types
4649
az login
4750
```
4851

49-
2. Initialize and apply:
52+
2. Initialize, validate and plan:
5053

5154
```sh
5255
terraform init -upgrade
53-
terraform apply -auto-approve
54-
```
55-
56-
Keep your `terraform.tfvars` minimal: set only `app_display_name`, and explicitly opt-in to optional resources (service principal, client secret, RBAC scope) when you need them.
57-
58-
3. Validate and plan:
59-
60-
```sh
6156
terraform validate
6257
terraform plan
6358
```
6459

65-
4. Apply:
60+
> Keep your `terraform.tfvars` minimal: set only `app_display_name`, and explicitly opt-in to optional resources (service principal, client secret, RBAC scope) when you need them.
61+
62+
3. Apply:
6663

6764
```sh
6865
terraform apply -auto-approve
6966
```
7067

71-
If you need Azure RBAC role assignments, use an AzureRM-based template (requires a subscription context and scope such as a subscription or resource group).
72-
73-
> These `TF_VAR_*` environment variables are scoped to your current shell session.
74-
75-
## Notes
68+
> If you need Azure RBAC role assignments, use an AzureRM-based template (requires a subscription context and scope such as a subscription or resource group). These `TF_VAR_*` environment variables are scoped to your current shell session.
7669
77-
- Creating applications, service principals, and secrets requires Microsoft Entra ID permissions (e.g., Application Administrator or appropriate Microsoft Graph application roles).
78-
- This template does not create Azure resources and does not require a resource group.
70+
> [!NOTE]
71+
> - Creating applications, service principals, and secrets requires Microsoft Entra ID permissions (e.g., Application Administrator or appropriate Microsoft Graph application roles).
72+
> - This template does not create Azure resources and does not require a resource group.
7973
8074
<!-- START BADGE -->
8175
<div align="center">

0 commit comments

Comments
 (0)