You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When using Dynamic User as membership type for an Administrative Unit, it is not possible anymore to add groups to the AU. We therefore use the default "assigned" membership type.
| <aname="input_additional_permissions"></a> [additional\_permissions](#input\_additional\_permissions)| Additional Subscription-Level Permissions the Service Principal needs. |`list(string)`|`[]`| no |
250
249
| <aname="input_additional_required_resource_accesses"></a> [additional\_required\_resource\_accesses](#input\_additional\_required\_resource\_accesses)| Additional AAD-Level Resource Accesses the replicator Service Principal needs. |`list(object({ resource_app_id = string, resource_accesses = list(object({ id = string, type = string })) }))`|`[]`| no |
251
-
| <aname="input_administrative_unit_membership_rule"></a> [administrative\_unit\_membership\_rule](#input\_administrative\_unit\_membership\_rule)| Dynamic membership rule for the Administrative Unit. Required when administrative\_unit\_name is set.<br><br>Suggested default: "(user.accountEnabled -eq true)"<br>NOTE: This rule will include ALL active users in your tenant. Consider more restrictive rules for production use.<br><br>Examples for more restrictive rules:<br>- "(user.companyName -eq \"MyCompany\") and (user.accountEnabled -eq true)" - Active users from specific company<br>- "(user.userType -eq \"Member\") and (user.accountEnabled -eq true)" - Active member users only<br><br>For more information on membership rules, see:<br>https://learn.microsoft.com/en-us/entra/identity/users/groups-dynamic-membership|`string`|`null`| no |
252
250
| <aname="input_administrative_unit_name"></a> [administrative\_unit\_name](#input\_administrative\_unit\_name)| Display name of the adminstration-unit name where the user groups are managed. |`string`|`null`| no |
253
251
| <aname="input_application_owners"></a> [application\_owners](#input\_application\_owners)| List of user principals that should be added as owners to the created service principals. |`list(string)`|`[]`| no |
254
252
| <aname="input_can_cancel_subscriptions_in_scopes"></a> [can\_cancel\_subscriptions\_in\_scopes](#input\_can\_cancel\_subscriptions\_in\_scopes)| The scopes to which Service Principal cancel subscription permission is assigned to. List of management group id of form `/providers/Microsoft.Management/managementGroups/<mgmtGroupId>/`. |`list(string)`|`[]`| no |
|[azuread_application_published_app_ids.well_known](https://registry.terraform.io/providers/hashicorp/azuread/latest/docs/data-sources/application_published_app_ids)| data source |
41
40
|[azuread_application_template.enterprise_app](https://registry.terraform.io/providers/hashicorp/azuread/latest/docs/data-sources/application_template)| data source |
| <aname="input_additional_permissions"></a> [additional\_permissions](#input\_additional\_permissions)| Additional Subscription-Level Permissions the Service Principal needs. |`list(string)`|`[]`| no |
49
48
| <aname="input_additional_required_resource_accesses"></a> [additional\_required\_resource\_accesses](#input\_additional\_required\_resource\_accesses)| Additional AAD-Level Resource Accesses the Service Principal needs. |`list(object({ resource_app_id = string, resource_accesses = list(object({ id = string, type = string })) }))`|`[]`| no |
50
-
| <aname="input_administrative_unit_membership_rule"></a> [administrative\_unit\_membership\_rule](#input\_administrative\_unit\_membership\_rule)| Dynamic membership rule for the Administrative Unit. Required when administrative\_unit\_name is set.<br><br>Suggested default: "(user.accountEnabled -eq true)"<br>NOTE: This rule will include ALL active users in your tenant. Consider more restrictive rules for production use.<br><br>Examples for more restrictive rules:<br>- "(user.companyName -eq \"MyCompany\") and (user.accountEnabled -eq true)" - Active users from specific company<br>- "(user.userType -eq \"Member\") and (user.accountEnabled -eq true)" - Active member users only<br><br>For more information on membership rules, see:<br>https://learn.microsoft.com/en-us/entra/identity/users/groups-dynamic-membership|`string`|`null`| no |
51
49
| <aname="input_administrative_unit_name"></a> [administrative\_unit\_name](#input\_administrative\_unit\_name)| Display name of the adminstration-unit name where the user groups are managed. |`string`|`null`| no |
52
50
| <aname="input_application_owners"></a> [application\_owners](#input\_application\_owners)| List of user principals that should be added as owners to the replicator service principal. |`list(string)`|`[]`| no |
53
51
| <aname="input_assignment_scopes"></a> [assignment\_scopes](#input\_assignment\_scopes)| The scopes to which Service Principal permissions is assigned to. List of management group id of form `/providers/Microsoft.Management/managementGroups/<mgmtGroupId>/`. |`list(string)`| n/a | yes |
error_message="When administrative_unit_name is set, administrative_unit_membership_rule must also be provided. Suggested value: \"(user.accountEnabled -eq true)\""
0 commit comments