Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Azure Key Vault Secret / Issue With Access Policies #627

Closed
hashibot opened this issue Dec 13, 2017 · 4 comments
Closed

Azure Key Vault Secret / Issue With Access Policies #627

hashibot opened this issue Dec 13, 2017 · 4 comments
Labels

Comments

@hashibot
Copy link

This issue was originally opened by @hmarcelodn as hashicorp/terraform#16908. It was migrated here as a result of the provider split. The original body of the issue is below.


Hi Terraform Team,

I am working on provisioning a couple of Azure Key Vaults and its secrets.

I created the resources and assigned a few Access Policies:

1- My self full permissions
2- My terraform AD Application w/ full permissions
3- An application with get permissions

My user Access policy works just fine. But the other two policies appeared in the list but its like its not taking the avatar image, like it were not referencing to the real object in AD. As a result of that when I want to create secrets usings my Terraform AD Application it gave me "Access Denied".

I added manually the policy in the Key Vault and referenced the Terraform AD Application and I gave it the same full permissions then it worked. This time I see the same object_id referenced twice in the Access Policies list, the one I created manually works and the one with Terraform did not.

Any suggestion?

@pixelicous
Copy link

You referenced the wrong ID, maybe of the app instead of the spn.. and even if you did reference the spn, check you referenced the obj id or the application id, those are different.. you have 4 ids!! :D way to go microsoft, for the app, for the spn, and each has two ids

@pixelicous
Copy link

@tombuildsstuff this is not an issue.. you can close this one..

@katbyte
Copy link
Collaborator

katbyte commented May 18, 2018

@pixelicous, closing as requested 🙂

@ghost
Copy link

ghost commented Mar 31, 2020

I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.

If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. If you feel I made an error 🤖 🙉 , please reach out to my human friends 👉 [email protected]. Thanks!

@ghost ghost locked and limited conversation to collaborators Mar 31, 2020
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
Projects
None yet
Development

No branches or pull requests

3 participants