Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add support for creating 'Okta API scopes' #69

Closed
ghost opened this issue Mar 18, 2020 · 14 comments · Fixed by #356
Closed

Add support for creating 'Okta API scopes' #69

ghost opened this issue Mar 18, 2020 · 14 comments · Fixed by #356
Assignees
Labels
enhancement Asking for new behavior or feature

Comments

@ghost
Copy link

ghost commented Mar 18, 2020

@rachrdfds commented on Dec 2, 2019, 3:01 PM UTC:

Is your feature request related to a problem? Please describe.
When creating an application that is to be used to create and maintain other Okta applications etc. in Okta, some Okta API scopes must be enabled/granted on the application.

Currently I can create the application using Terraform but the I ahve to set the Okta API scopes manually (GUI):
image

Describe the solution you'd like
A way to create the application with the specified Okta API scopes. It could be an array of strings containing one or more of (below is currently a complete list):

  • okta.apps.manage
  • okta.apps.read
  • okta.authorizationServers.manage
  • okta.authorizationServers.read
  • okta.clients.manage
  • okta.clients.read
  • okta.clients.register
  • okta.eventHooks.manage
  • okta.eventHooks.read
  • okta.events.read
  • okta.factors.manage
  • okta.factors.read
  • okta.groups.manage
  • okta.groups.read
  • okta.idps.manage
  • okta.idps.read
  • okta.inlineHooks.manage
  • okta.inlineHooks.read
  • okta.logs.read
  • okta.roles.manage
  • okta.roles.read
  • okta.schemas.manage
  • okta.schemas.read
  • okta.users.manage
  • okta.users.manage.self
  • okta.users.read
  • okta.users.read.self

Describe alternatives you've considered
I don't see any workaround for this.

This issue was moved by noinarisak from articulate/terraform-provider-okta#361.

@ghost ghost added the enhancement Asking for new behavior or feature label Mar 18, 2020
@ghost
Copy link
Author

ghost commented Mar 18, 2020

@quantumew commented on Dec 2, 2019, 5:16 PM UTC:

We will investigate this one. Often Okta only exposes features like this on their internal API which is subject to change and generally doesn't accept API token auth. If this is the case, we will open a feature request and wait for an endpoint to get publicly released.

@ghost
Copy link
Author

ghost commented Mar 18, 2020

@rachrdfds commented on Dec 4, 2019, 12:33 PM UTC:

Okta feature request for exposing Okta API scopes created: https://ideas.okta.com/app/#/case/114235

@ghost
Copy link
Author

ghost commented Mar 18, 2020

@mbudnek commented on Mar 5, 2020, 5:32 PM UTC:

To update, the API for this is currently available in early access: https://developer.okta.com/docs/reference/api/apps/#application-oauth-2-0-scope-consent-grant-operations

OAuth authorization for Okta APIs went GA in their preview environment today, so this would be really nice to have.

@github-actions
Copy link

This issue is stale because it has been open 60 days with no activity. Remove stale label or comment or this will be closed in 5 days

@github-actions github-actions bot added the stale label May 18, 2020
@Ruffio
Copy link

Ruffio commented May 18, 2020

this is still a feature request

@ghost ghost removed the stale label May 18, 2020
@github-actions
Copy link

This issue is stale because it has been open 60 days with no activity. Remove stale label or comment or this will be closed in 5 days

@github-actions github-actions bot added the stale label Jul 18, 2020
@khitrenovich
Copy link

this is still a feature request

@ghost ghost removed the stale label Jul 20, 2020
@noinarisak
Copy link
Contributor

Related #87

@adw1n
Copy link

adw1n commented Sep 20, 2020

I thought only apps created using the /oauth2/v1/clients endpoint can take advantage of Okta Management API scopes https://developer.okta.com/docs/guides/implement-oauth-for-okta-serviceapp/overview/. okta-sdk-golang doesn't support /oauth2/v1/clients endpoint which means terraform-provider-okta also doesn't support it. So I think granting these scopes to any app created with terraform-provider-okta won't have any effect but I may very well be mistaken.

@mbudnek
Copy link
Contributor

mbudnek commented Sep 20, 2020

@adw1n From experimentation it seems that it doesn't matter how an app is created. Any OAuth app can be granted scopes and use them to access the Okta API.

@ymylei
Copy link
Contributor

ymylei commented Sep 26, 2020

@adw1n I'm pretty sure the difference between apps and clients is the dynamic oauth client support. For example I can see this EA API doc for the apps endpoint for configuring the OKTA management scopes: https://developer.okta.com/docs/reference/api/apps/#application-oauth-2-0-scope-consent-grant-operations

@github-actions
Copy link

This issue is stale because it has been open 60 days with no activity. Remove stale label or comment or this will be closed in 5 days

@github-actions github-actions bot added the stale label Nov 26, 2020
@mbudnek
Copy link
Contributor

mbudnek commented Nov 26, 2020

Please keep this open

@github-actions github-actions bot closed this as completed Dec 2, 2020
@mbudnek
Copy link
Contributor

mbudnek commented Dec 2, 2020

@noinarisak Can you re-open this issue. It is still relevant. Also, can you investigate why the GitHub Actions bot is closing things despite my comment?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement Asking for new behavior or feature
Projects
None yet
Development

Successfully merging a pull request may close this issue.

7 participants