-
Notifications
You must be signed in to change notification settings - Fork 142
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow users to bring their own credential for deployment #176
Comments
@glennmusa - would it be within scope to bring your own service principal? |
@bspender certainly doesn't seem unrealistic! That's a great point. Thanks for bringing it up. Looks like we could have some conversations about BYO-Deployment Credential |
I imagine it's do-able by passing along to an MLZ command a |
We'll need to get the object ID for setting KeyVault Access Policies when using KeyVault secrets as bastion jumpbox passwords: |
Benefit/Result/Outcome
It'd be nice if I could deploy the MLZ and its configuration resources using a credential I already have.
Description
Today, we build the name for the MLZ Configuration Service Principal that is granted Contributor RBAC permissions on deployment subscriptions using the
mlz_env_name
argument.Acceptance Criteria
--username
and--password
for use with deployments when a--service-principal
flag is suppliedmlz_objectid
in .tfvars for setting Bastion jumpbox KeyVault access policiesThe text was updated successfully, but these errors were encountered: