This repository has been archived by the owner on Jun 14, 2021. It is now read-only.
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
77 changed files
with
1,835 additions
and
456 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,3 +1,6 @@ | ||
OKTA_API_TOKEN=<api token> | ||
OKTA_ORG_NAME=<org> | ||
OKTA_BASE_URL=oktapreview.com | ||
|
||
# Uncomment line below to get debug log output, this will allow you to see every HTTP request | ||
# TF_LOG=debug |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,3 +1,46 @@ | ||
For Release v3.0.0: | ||
|
||
* Updated provider protocol version to v5 to support Terraform v0.12.0 | ||
|
||
For Release v3.0.1 | ||
|
||
* Add some missing okta_idp_saml settings | ||
* Add registration inline hook type | ||
|
||
For Release v3.0.2 | ||
|
||
* Use backoff/retries functionality for XML API calls | ||
|
||
For Release v3.0.3 | ||
|
||
* Add okta_idp_saml data source | ||
* Support import user by email | ||
|
||
For Release v3.0.4 | ||
|
||
* Change type of custom_profile_attributes from map to JSON string to support all types | ||
* Add okta_app_saml data source | ||
* Add okta_app_metadata_saml data source | ||
* Add okta_idp_metadata_saml data source | ||
|
||
For Release v3.0.5 | ||
|
||
* Fix bug introduced in v3.0.4. User data source was not updated to the new caustom_profile_attribute type | ||
* Added test to cover this scenario, tests were passiing | ||
|
||
For Release v3.0.6 | ||
|
||
* Allow client_id to be set on OIDC application, while also maintaining the computed version. With some auth methods, such as basic auth, this is possible. | ||
|
||
For Release v3.0.7 | ||
|
||
* Add group_assignments for SAML and social IdPs | ||
|
||
For Release v3.0.8 | ||
|
||
* Add issuer_mode to social IdP. Our test org does not have a custom domain setup, thus it was working there but not in other orgs. Hard to test both scenarios in one org. | ||
|
||
For Release v3.0.9 | ||
|
||
* Add okta_template_email resource for defining Custom Email Templates | ||
* Add okta_group_roles resource for defining the admin roles tied to a group |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file was deleted.
Oops, something went wrong.
This file was deleted.
Oops, something went wrong.
This file was deleted.
Oops, something went wrong.
This file was deleted.
Oops, something went wrong.
This file was deleted.
Oops, something went wrong.
This file was deleted.
Oops, something went wrong.
This file was deleted.
Oops, something went wrong.
This file was deleted.
Oops, something went wrong.
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,19 @@ | ||
resource okta_app_saml test { | ||
label = "testAcc_replace_with_uuid" | ||
sso_url = "http://google.com" | ||
recipient = "http://here.com" | ||
destination = "http://its-about-the-journey.com" | ||
audience = "http://audience.com" | ||
subject_name_id_template = "$${user.userName}" | ||
subject_name_id_format = "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress" | ||
response_signed = true | ||
signature_algorithm = "RSA_SHA256" | ||
digest_algorithm = "SHA256" | ||
honor_force_authn = false | ||
authn_context_class_ref = "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport" | ||
} | ||
|
||
data okta_app_metadata_saml test { | ||
app_id = "${okta_app_saml.test.id}" | ||
key_id = "${okta_app_saml.test.key_id}" | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,7 +1,10 @@ | ||
resource "okta_app_oauth" "test" { | ||
label = "testAcc_replace_with_uuid" | ||
type = "web" | ||
grant_types = ["authorization_code"] | ||
redirect_uris = ["http://d.com/"] | ||
response_types = ["code"] | ||
label = "testAcc_replace_with_uuid" | ||
type = "web" | ||
grant_types = ["authorization_code"] | ||
redirect_uris = ["http://d.com/"] | ||
response_types = ["code"] | ||
client_basic_secret = "something_from_somewhere" | ||
custom_client_id = "something_from_somewhere" | ||
token_endpoint_auth_method = "client_secret_basic" | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,22 @@ | ||
resource okta_app_saml test { | ||
label = "testAcc_replace_with_uuid" | ||
sso_url = "http://google.com" | ||
recipient = "http://here.com" | ||
destination = "http://its-about-the-journey.com" | ||
audience = "http://audience.com" | ||
subject_name_id_template = "$${user.userName}" | ||
subject_name_id_format = "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress" | ||
response_signed = true | ||
signature_algorithm = "RSA_SHA256" | ||
digest_algorithm = "SHA256" | ||
honor_force_authn = false | ||
authn_context_class_ref = "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport" | ||
} | ||
|
||
data okta_app_saml test { | ||
id = "${okta_app_saml.test.id}" | ||
} | ||
|
||
data okta_app_saml test_label { | ||
label = "${okta_app_saml.test.label}" | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,6 @@ | ||
# okta_group_roles | ||
|
||
Represents an Okta Group Admin Roles. [See Okta documentation for more details](https://developer.okta.com/docs/reference/api/roles/#list-roles-assigned-to-group). | ||
|
||
* Example of a group assigned as a SUPER_ADMIN [can be found here](./basic.tf) | ||
* Example of a group assigned to all roles [can be found here](./all_roles.tf) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,19 @@ | ||
resource okta_group test { | ||
name = "testAcc_replace_with_uuid" | ||
description = "testing" | ||
} | ||
|
||
resource okta_group_roles test { | ||
group_id = "${okta_group.test.id}" | ||
|
||
admin_roles = [ | ||
"SUPER_ADMIN", | ||
"ORG_ADMIN", | ||
"API_ACCESS_MANAGEMENT_ADMIN", | ||
"APP_ADMIN", | ||
"USER_ADMIN", | ||
"MOBILE_ADMIN", | ||
"READ_ONLY_ADMIN", | ||
"HELP_DESK_ADMIN", | ||
] | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,9 @@ | ||
resource okta_group test { | ||
name = "testAcc_replace_with_uuid" | ||
description = "testing" | ||
} | ||
|
||
resource okta_group_roles test { | ||
group_id = "${okta_group.test.id}" | ||
admin_roles = ["SUPER_ADMIN"] | ||
} |
Oops, something went wrong.