You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Please vote on this issue by adding a 👍 reaction to the original issue to help the community and maintainers prioritise this request
Please do not leave "+1" or "me too" comments, they generate extra noise for issue followers and do not help prioritise the request
If you are interested in working on this issue or have submitted a pull request, please leave a comment
Description
The permissions Application.ReadWrite.All and Directory.ReadWrite.All are extremely high privilege permissions on the Azure tenant level and should not be used unless absolutely unavoidable.
The current documentation states:
When authenticated with a service principal, this resource requires one of the following application roles: Application.ReadWrite.All or Directory.ReadWrite.All
It may be possible to create applications using this resource with the Application.ReadWrite.OwnedBy application role, provided the principal being used to run Terraform is included in the owners property. ...
The statement that the permission Application.ReadWrite.OwnedBymay be sufficient is vague and leads engineers to needlessly resort to tenant level write permissions at the first error they face.
There is one common pattern at the moment for which users get 403 with just the Application.ReadWrite.OwnedBy permission: if you specify additional owners of an azuread_application you, in addition to Application.ReadWrite.OwnedBy also need User.Read.All. This should be added to the documentation.
New or Affected Resource(s)
azuread_application
Potential Terraform Configuration
References
Issues about receiving a 403 when using additional owners and resolved by adding the User.Read.All permission: #703 #853
The text was updated successfully, but these errors were encountered:
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.
If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.
Community Note
Description
The permissions
Application.ReadWrite.All
andDirectory.ReadWrite.All
are extremely high privilege permissions on the Azure tenant level and should not be used unless absolutely unavoidable.The current documentation states:
The statement that the permission
Application.ReadWrite.OwnedBy
may be sufficient is vague and leads engineers to needlessly resort to tenant level write permissions at the first error they face.There is one common pattern at the moment for which users get 403 with just the
Application.ReadWrite.OwnedBy
permission: if you specify additional owners of an azuread_application you, in addition toApplication.ReadWrite.OwnedBy
also needUser.Read.All
. This should be added to the documentation.New or Affected Resource(s)
Potential Terraform Configuration
References
Issues about receiving a 403 when using additional
owners
and resolved by adding theUser.Read.All
permission:#703
#853
The text was updated successfully, but these errors were encountered: