-
Notifications
You must be signed in to change notification settings - Fork 29
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Login as AAD User #30
Comments
I ran into the same limitation. Since it is likely that you are using the azurerm provider together with terraform-provider-mssql, I think it would make sense for terraform-provider-mssql to support AAD auth as provider-level configuration the same way azurerm does it, at least the CLI method and the MSI method. I would be willing to author a PR. Ping @magne ? |
Hi, Im also looking into solving this, cannot find anything that works. |
If you submit a PR, @bittrance, I will certainly consider it. For this kind of added functionality, I would also hope for tests 😄 |
I hacked togehter a PoC using the new fedauth option. This means that we can add a third login method (with no arguments) apart from
@magne Do you have a preference? |
Just pick what feels natural. I hope this comes with tests and docs if it makes it to a PR 😄 |
Hello!
My organization uses free Azure AD, so we don't want to but the P1 level. Problem is that when using free Azure AD users from an external provider can be added only via AD User. It's not possible via Service Principal (P1 level needed and role Directory Readers) or via SQL Account (Only from AAD users it can be). So currently there is a need to manually login into Azure SQL Database and add a user via SQL command (CREATE USER .. FROM EXTERNAL PROVIDER). So we want to automatize that, but the only way to do that is to log in as an AD User. In the current implementation of the provider, I haven't seen such an option to do that. Maybe I'm missing some option?
The text was updated successfully, but these errors were encountered: