-
Notifications
You must be signed in to change notification settings - Fork 300
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
azuread_access_package_catalog access error despite global administrator #1169
Comments
For some additional information on this topic: I am having the same authorization issue, as long as I am working with my user in terraform:
I have tested with accounts with the following permissions:
The moment I switch authorisation to a service principal the plan and apply works just fine. The service princial has the Catalog owner permission on that catalog. |
Are you making sure to sign out and sign back in to Azure CLI after assigning directory roles? You can also try deleting the |
I used the configuration specified above and it resulted in the same error as @TechnicallyJoe stated above. I am able to test even more, if you have anything other that I might try? |
Looks like we need to update our docs guidance for this data source, as the API docs state that |
I am definitly using no personal account. |
Is there any updates on this topic here? |
I think this is the same issue as #1069 and is an upstream Microsoft issue. |
I also have this issue. |
Any updates to this? This is insanely annoying when testing with a user principle. I can confirm that this is still an issue. |
I have the same issue. I tryed to import existing azuread_access_package_catalog and got
The call https://graph.microsoft.com/v1.0/identityGovernance/entitlementManagement/catalogs/{guid} works in Microsoft Graph Explorer. In the request is a bearer token included. It seems that such a token ist not provided via the terraform calls. |
Some more info: I created an SP and tried logging in with it using the azure cli - Still wouldn't work. But if i add the SP using environment vars then it works fine. At least its a related bug EDIT: I have added this to the original post. |
Community Note
Terraform (and AzureAD Provider) Version
Affected Resource(s)
azuread_access_package_catalog_role
azuread_access_package_catalog
azuread_access_package_catalog_role_assignment
Terraform Configuration Files
Debug Output
https://gist.github.com/TechnicallyJoe/7958bc889ba24ebdc3db9485e68b91da
Panic Output
Expected Behavior
It to create a catalog
Actual Behavior
It errors -> See output
Steps to Reproduce
terraform apply
Important Factoids
data "azuread_access_package_catalog_role" "owner_role" {
and putting in the id directly replaces the error with an error onazuread_access_package_catalog
UPDATE:
Also tested manually creating a catalog and then adding resources to it. Got errors using my user principal, but setting up a service principal with
EntitlementManagement.Read.All
rights worked and manually assigning it to the catalog owners on the catalog.UPDATE 2:
Logging into an Service Principal using az cli also does not work. I had to use environment vars to get it to work. That is, at the very least, a related bug, if not the same one.
The text was updated successfully, but these errors were encountered: