-
Notifications
You must be signed in to change notification settings - Fork 301
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
azuread_user: Support for "PasswordNeverExpire" option #136
Comments
Hello, Any news? |
Hi @lzadjsf, Thank you for opening this issue so we can track this feature. As that property is currently not exposed but the SDK this is not on our current roadmap to implement anytime soon. |
This might be possible via the additional properties map.. 🤔 |
@katbyte What do you mean by the additionnal properties map? It does interest me. |
This is supported by the Azure AD Graph API. I have logged an issue requesting SDK support. |
@manicminer for this one would you rather have an attribute called Or would you prefer to have two Boolean attributes that we then use to construct the above string to send to the API? https://docs.microsoft.com/en-us/graph/api/resources/user?view=graph-rest-1.0#properties |
@alexwilcox9 Given this is an enumeration string with exclusivity rules, it would probably be best implemented as booleans in the provider so we can validate them nicely 👍 |
This functionality has been released in v2.2.0 of the Terraform Provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template. Thank you! |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Community Note
Description
Times to times there is a need to set password never expire for Azure AD user account as it is a service account. It need to applications that still doesn't support latest authentication and authorisation mechanisms. Say, services which requires for LDAP bindings through Azure Active Directory Domain Services.
It can be easily done by PowerShell command:
By the way, there is a need to perform that kind of task through TF scripts during automatic deployment of service.
New or Affected Resource(s)
Potential Terraform Configuration
References
The text was updated successfully, but these errors were encountered: