@@ -260,9 +260,8 @@ Required: `false`<br />
260
260
Permissions contains a set of permissions that are granted to the given application.
261
261
Currently only applicable for Azure AD clients.
262
262
263
- Relevant information:
264
-
265
- * [ https://doc .<<tenant()>>.cloud.nais.io/security/auth/azure-ad/configuration#fine-grained-access-control] ( https://doc.<<tenant()>>.cloud.nais.io/security/auth/azure-ad/configuration#fine-grained-access-control )
263
+ !!! failure "Deprecated"
264
+ This feature is deprecated, preserved only for backwards compatibility.
266
265
267
266
Type: ` object ` <br />
268
267
Required: ` false ` <br />
@@ -300,9 +299,8 @@ Required: `false`<br />
300
299
###### accessPolicy.inbound.rules[ ] .permissions.roles
301
300
Roles is a set of custom permission roles that are granted to a given application.
302
301
303
- Relevant information:
304
-
305
- * [ https://doc .<<tenant()>>.cloud.nais.io/security/auth/azure-ad/configuration#custom-roles] ( https://doc.<<tenant()>>.cloud.nais.io/security/auth/azure-ad/configuration#custom-roles )
302
+ !!! failure "Deprecated"
303
+ This feature is deprecated, preserved only for backwards compatibility.
306
304
307
305
Type: ` array ` <br />
308
306
Required: ` false ` <br />
@@ -340,9 +338,8 @@ Required: `false`<br />
340
338
###### accessPolicy.inbound.rules[ ] .permissions.scopes
341
339
Scopes is a set of custom permission scopes that are granted to a given application.
342
340
343
- Relevant information:
344
-
345
- * [ https://doc .<<tenant()>>.cloud.nais.io/security/auth/azure-ad/configuration#custom-scopes] ( https://doc.<<tenant()>>.cloud.nais.io/security/auth/azure-ad/configuration#custom-scopes )
341
+ !!! failure "Deprecated"
342
+ This feature is deprecated, preserved only for backwards compatibility.
346
343
347
344
Type: ` array ` <br />
348
345
Required: ` false ` <br />
@@ -611,7 +608,7 @@ Required: `false`<br />
611
608
namespace: q3
612
609
```
613
610
614
- {%- if tenant() == "nav" %}
611
+ {%- if tenant() in ( "nav", "atil") %}
615
612
## azure
616
613
Provisions and configures Azure resources.
617
614
@@ -754,6 +751,7 @@ Default value: `false`<br />
754
751
enabled: true
755
752
```
756
753
754
+ {%- if tenant() == "nav" %}
757
755
#### azure.application.tenant
758
756
Tenant targets a specific tenant for the Entra ID application.
759
757
Only works in the development clusters. Only use this if you have a specific reason to do so.
@@ -776,6 +774,7 @@ Allowed values: `nav.no`, `trygdeetaten.no`<br />
776
774
tenant: nav.no
777
775
```
778
776
777
+ {%- endif %}
779
778
### azure.sidecar
780
779
Sidecar configures a sidecar that intercepts every HTTP request, and performs the OIDC flow if necessary.
781
780
All requests to ingress + ` /oauth2 ` will be processed only by the sidecar, whereas all other requests
0 commit comments