You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
administrative_unit_membership_rule = "(user.accountEnabled -eq true)" # Include all active users
130
+
}
131
+
```
132
+
110
133
## Workload Identity Federation for Multiple Environments
111
134
112
135
When using multiple MCA service principals with Workload Identity Federation (WIF), you can configure per-service-principal subjects to support different Kubernetes namespaces or environments.
| <aname="input_additional_permissions"></a> [additional\_permissions](#input\_additional\_permissions)| Additional Subscription-Level Permissions the Service Principal needs. |`list(string)`|`[]`| no |
236
250
| <aname="input_additional_required_resource_accesses"></a> [additional\_required\_resource\_accesses](#input\_additional\_required\_resource\_accesses)| Additional AAD-Level Resource Accesses the replicator Service Principal needs. |`list(object({ resource_app_id = string, resource_accesses = list(object({ id = string, type = string })) }))`|`[]`| no |
251
+
| <aname="input_administrative_unit_membership_rule"></a> [administrative\_unit\_membership\_rule](#input\_administrative\_unit\_membership\_rule)| Dynamic membership rule for the Administrative Unit. Required when administrative\_unit\_name is set.<br><br>Suggested default: "(user.accountEnabled -eq true)"<br>NOTE: This rule will include ALL active users in your tenant. Consider more restrictive rules for production use.<br><br>Examples for more restrictive rules:<br>- "(user.companyName -eq \"MyCompany\") and (user.accountEnabled -eq true)" - Active users from specific company<br>- "(user.userType -eq \"Member\") and (user.accountEnabled -eq true)" - Active member users only<br><br>For more information on membership rules, see:<br>https://learn.microsoft.com/en-us/entra/identity/users/groups-dynamic-membership|`string`|`null`| no |
237
252
| <aname="input_administrative_unit_name"></a> [administrative\_unit\_name](#input\_administrative\_unit\_name)| Display name of the adminstration-unit name where the user groups are managed. |`string`|`null`| no |
238
253
| <aname="input_application_owners"></a> [application\_owners](#input\_application\_owners)| List of user principals that should be added as owners to the created service principals. |`list(string)`|`[]`| no |
239
254
| <aname="input_can_cancel_subscriptions_in_scopes"></a> [can\_cancel\_subscriptions\_in\_scopes](#input\_can\_cancel\_subscriptions\_in\_scopes)| The scopes to which Service Principal cancel subscription permission is assigned to. List of management group id of form `/providers/Microsoft.Management/managementGroups/<mgmtGroupId>/`. |`list(string)`|`[]`| no |
|[azuread_application_published_app_ids.well_known](https://registry.terraform.io/providers/hashicorp/azuread/latest/docs/data-sources/application_published_app_ids)| data source |
43
41
|[azuread_application_template.enterprise_app](https://registry.terraform.io/providers/hashicorp/azuread/latest/docs/data-sources/application_template)| data source |
| <aname="input_additional_permissions"></a> [additional\_permissions](#input\_additional\_permissions)| Additional Subscription-Level Permissions the Service Principal needs. |`list(string)`|`[]`| no |
51
49
| <aname="input_additional_required_resource_accesses"></a> [additional\_required\_resource\_accesses](#input\_additional\_required\_resource\_accesses)| Additional AAD-Level Resource Accesses the Service Principal needs. |`list(object({ resource_app_id = string, resource_accesses = list(object({ id = string, type = string })) }))`|`[]`| no |
50
+
| <aname="input_administrative_unit_membership_rule"></a> [administrative\_unit\_membership\_rule](#input\_administrative\_unit\_membership\_rule)| Dynamic membership rule for the Administrative Unit. Required when administrative\_unit\_name is set.<br><br>Suggested default: "(user.accountEnabled -eq true)"<br>NOTE: This rule will include ALL active users in your tenant. Consider more restrictive rules for production use.<br><br>Examples for more restrictive rules:<br>- "(user.companyName -eq \"MyCompany\") and (user.accountEnabled -eq true)" - Active users from specific company<br>- "(user.userType -eq \"Member\") and (user.accountEnabled -eq true)" - Active member users only<br><br>For more information on membership rules, see:<br>https://learn.microsoft.com/en-us/entra/identity/users/groups-dynamic-membership|`string`|`null`| no |
52
51
| <aname="input_administrative_unit_name"></a> [administrative\_unit\_name](#input\_administrative\_unit\_name)| Display name of the adminstration-unit name where the user groups are managed. |`string`|`null`| no |
53
52
| <aname="input_application_owners"></a> [application\_owners](#input\_application\_owners)| List of user principals that should be added as owners to the replicator service principal. |`list(string)`|`[]`| no |
54
53
| <aname="input_assignment_scopes"></a> [assignment\_scopes](#input\_assignment\_scopes)| The scopes to which Service Principal permissions is assigned to. List of management group id of form `/providers/Microsoft.Management/managementGroups/<mgmtGroupId>/`. |`list(string)`| n/a | yes |
error_message="When administrative_unit_name is set, administrative_unit_membership_rule must also be provided. Suggested value: \"(user.accountEnabled -eq true)\""
0 commit comments