You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: 4_identity-security/entra_id/README.md
+15-21Lines changed: 15 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,4 +1,4 @@
1
-
# Terraform Template - Microsoft Entra ID (Entra ID)
1
+
# Terraform Template - Microsoft Entra ID (App)
2
2
3
3
Costa Rica
4
4
@@ -9,12 +9,15 @@ Last updated: 2026-02-03
9
9
10
10
------------------------------------------
11
11
12
-
> High level: creates a Microsoft Entra ID application registration (tenant-level). Optionally creates a service principal, a client secret, and (optionally) assigns an Azure RBAC role at a provided scope.
13
-
14
-
> High level: creates a Microsoft Entra ID application registration (tenant-level). Optionally creates a service principal and a client secret.
12
+
> This template contains Terraform configurations to create and manage a Microsoft Entra ID application registration (tenant-level). Optionally creates a service principal, a client secret, and (optionally) assigns an Azure RBAC role at a provided scope.
15
13
14
+
> [!NOTE]
16
15
> No Azure resource group is required unless you choose a resource-group RBAC scope (because the RG must already exist for role assignment).
-**main.tf**: Creates the application registration, optional service principal, and optional client secret.
@@ -46,36 +49,27 @@ Below is a list of variables used in this template, their expected values, types
46
49
az login
47
50
```
48
51
49
-
2. Initializeand apply:
52
+
2. Initialize, validate and plan:
50
53
51
54
```sh
52
55
terraform init -upgrade
53
-
terraform apply -auto-approve
54
-
```
55
-
56
-
Keep your `terraform.tfvars` minimal: set only `app_display_name`, and explicitly opt-in to optional resources (service principal, client secret, RBAC scope) when you need them.
57
-
58
-
3. Validate and plan:
59
-
60
-
```sh
61
56
terraform validate
62
57
terraform plan
63
58
```
64
59
65
-
4. Apply:
60
+
> Keep your `terraform.tfvars` minimal: set only `app_display_name`, and explicitly opt-in to optional resources (service principal, client secret, RBAC scope) when you need them.
61
+
62
+
3. Apply:
66
63
67
64
```sh
68
65
terraform apply -auto-approve
69
66
```
70
67
71
-
If you need Azure RBAC role assignments, use an AzureRM-based template (requires a subscription context and scope such as a subscription or resource group).
72
-
73
-
> These `TF_VAR_*` environment variables are scoped to your current shell session.
74
-
75
-
## Notes
68
+
> If you need Azure RBAC role assignments, use an AzureRM-based template (requires a subscription context and scope such as a subscription or resource group). These `TF_VAR_*` environment variables are scoped to your current shell session.
76
69
77
-
- Creating applications, service principals, and secrets requires Microsoft Entra ID permissions (e.g., Application Administrator or appropriate Microsoft Graph application roles).
78
-
- This template does not create Azure resources and does not require a resource group.
70
+
> [!NOTE]
71
+
> - Creating applications, service principals, and secrets requires Microsoft Entra ID permissions (e.g., Application Administrator or appropriate Microsoft Graph application roles).
72
+
> - This template does not create Azure resources and does not require a resource group.
0 commit comments