-
Notifications
You must be signed in to change notification settings - Fork 301
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Azure AD - Scoped Assignments for Custom Azure AD roles #742
Comments
Thinking about working on something like Looks pretty similar to azuread_directory_role_member I think this could be supported by msgraph and the implementation should be very similar to ce67563 |
Hi @timothyleung1, you're welcome to take a look at this. I would prefer to use the existing |
This functionality has been released in v2.25.0 of the Terraform Provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template. Thank you! |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Community Note
Description
We would like to see the provider support the ability to assign custom directory roles to a specific scope (i.e. application) instead of assigning the role with the entire directory as a scope.
See https://docs.microsoft.com/en-us/azure/active-directory/roles/custom-create#assign-a-custom-role-scoped-to-a-resource as to what I'm talking about.
New or Affected Resource(s)
Potential Terraform Configuration
References
The text was updated successfully, but these errors were encountered: