Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add an Oauth2 service app as an option to okta_admin_role_targets resource #2108

Open
Shocktrooper opened this issue Oct 23, 2024 · 0 comments
Labels
enhancement Asking for new behavior or feature

Comments

@Shocktrooper
Copy link

Community Note

  • Please vote on this issue by adding a 👍 reaction to the original issue to help the community and maintainers prioritize this request
  • Please do not leave "+1" or other comments that do not add relevant new information or questions, they generate extra noise for issue followers and do not help prioritize the request
  • If you are interested in working on this issue or have submitted a pull request, please leave a comment

Description

Currently the okta_admin_role_targets resource only supports a user as an attachment. OKTA also supports an Oauth2 application as a target that can have admin roles attached and this resource should support this or a separate resource should be made to support this.

The reason that I am proposing an addition to the current resource is because the resource is generically named vs specifying a user in the resource name E.G. user_okta_admin_role_targets

New or Affected Resource(s)

  • okta_admin_role_targets

Potential Terraform Configuration

resource "okta_admin_role_targets" "example" {
  app_id   = "<app_id>"
  role_type = "APP_ADMIN"
  apps      = ["oidc_client.<app_id>", "facebook"]
}

References

@Shocktrooper Shocktrooper added the enhancement Asking for new behavior or feature label Oct 23, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement Asking for new behavior or feature
Projects
None yet
Development

No branches or pull requests

1 participant