Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

azurerm_mysql_flexible_server - Support for Azure AD Authentication #19353

Closed
1 task done
rybal06 opened this issue Nov 18, 2022 · 2 comments
Closed
1 task done

azurerm_mysql_flexible_server - Support for Azure AD Authentication #19353

rybal06 opened this issue Nov 18, 2022 · 2 comments

Comments

@rybal06
Copy link

rybal06 commented Nov 18, 2022

Is there an existing issue for this?

  • I have searched the existing issues

Community Note

  • Please vote on this issue by adding a 👍 reaction to the original issue to help the community and maintainers prioritize this request
  • Please do not leave "+1" or "me too" comments, they generate extra noise for issue followers and do not help prioritize the request
  • If you are interested in working on this issue or have submitted a pull request, please leave a comment

Description

Azure AD authentication for mysql flex server has now gone GA:

It is a bit cumbersome as it requires a user-managed identity, which must be granted graph API permissions in order to enable this.

This request is to:
A. Allow linking the flex server to an existing user-managed identity.
B. Allow enabling the Azure AD signon feature in one of the three supported modes.
C. Define AAD administrator as a user/group (AAD principal)

New or Affected Resource(s)/Data Source(s)

azurerm_mysql_flexible_server

Potential Terraform Configuration

resource "azurerm_mysql_flexible_server" "example" {
  azuread_administrator {
    login_username              = "AzureAD Admin"
    object_id                   = "00000000-0000-0000-0000-000000000000"
    tenant_id                  = "00000000-0000-0000-0000-000000000000"
    azuread_authentication_only = true # If set to true, disable MySQL authentication, otherwise set to allow MySQL and Azure AD authentication.
  }
  identity {
    type = "UserAssigned"
    identity_ids = []
  }
}

If azuread_administrator block is passed is enabled; give an error if these are passed in:

administrator_login    = "psqladmin"
administrator_password = "H@Sh1CoR3!"

If azuread_administrator is passed in, but the identity configuration is missing, provide guidance as to how to configure the identity block and give an error.

References

https://learn.microsoft.com/en-us/azure/mysql/flexible-server/how-to-azure-ad
https://learn.microsoft.com/en-us/azure/templates/microsoft.dbformysql/flexibleservers/administrators?pivots=deployment-language-terraform

@rybal06 rybal06 changed the title Support for Azure AD Authentication azurerm_mysql_flexible_server - Support for Azure AD Authentication Nov 18, 2022
@rybal06
Copy link
Author

rybal06 commented Dec 8, 2022

Duplicate of #19272

@rybal06 rybal06 closed this as not planned Won't fix, can't repro, duplicate, stale Dec 8, 2022
@github-actions
Copy link

github-actions bot commented Jan 8, 2023

I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.
If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.

@github-actions github-actions bot locked as resolved and limited conversation to collaborators Jan 8, 2023
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

No branches or pull requests

2 participants