-
Notifications
You must be signed in to change notification settings - Fork 215
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow okta_policy_rule_signon to specify IdP #277
Comments
I have started working on implementing this |
I've just discovered this is a new feature that hasn't been rolled out everywhere yet. |
Hi @conor-mullen! Thanks for submitting this issue. As soon as this feature will be officially released, I'll get back to this and add the functionality to support IdP specifying. |
Hi @bogdanprodan-okta , I got this working locally so I'll leave a link to my code in case it helps you in the future when this feature gets released. |
Thanks, @conor-mullen! |
This issue is stale because it has been open 60 days with no activity. Remove stale label or comment or this will be closed in 5 days |
This issue is stale because it has been open 60 days with no activity. Remove stale label or comment or this will be closed in 5 days |
This issue is stale because it has been open 60 days with no activity. Remove stale label or comment or this will be closed in 5 days |
This issue is stale because it has been open 60 days with no activity. Remove stale label or comment or this will be closed in 5 days |
hi @conor-mullen conditions is the way to go about this as referenced at the beginning of the issue. So it won't be possible to put an identity provider on the okta_policy_rule_signon and have that behave as conditions do. cc/ @bogdanprodan-okta |
@monde @bogdanprodan-okta Can you please help/advise how to set the IDP condition on okta_policy_rule_signon via terraform ? |
Hi @monde @bogdanprodan-okta as per @MichaelOtte-lhsystems I don't quite understand the last comment on this ticket. There appears to be no way currently via Terraform to set the identityProvider as part of a signon policy rule. I know it's an EA feature that has to be specifically requested to be enabled for your org, and I've struggled to find any documentation about it. But certainly the official Okta GO SDK seems to support it - https://github.com/okta/okta-sdk-golang/blob/2e0d27210f938215f3e3b8d5d47f1b93bdc5b92c/okta/identityProviderPolicyRuleCondition.go#L21 So is there anyway this could be revisited? It would be great to be able to set this via Terraform :) |
especially as there is already a commit which fix that a31322b |
I'm asking @bogdanprodan-okta to color in some additional information on the current state of idp and sign on rules. |
Amazing, thank you! 😊 |
Community Note
Description
Through the Console and the API you can specify that Okta Sign-on Policy Rules should only apply when signing in through a specific IdP. I do not believe this can currently be achieved through this provider. Through the API this is done in the
conditions
object which looks something likeNew or Affected Resource(s)
Potential Terraform Configuration
My suggestion is to add 2 new optional arguments to okta_policy_rule_signon. The first would be
identity_provider
and would have the possible values of"ANY"
,"OKTA"
, and"SPECIFIC_IDP"
with the default being"ANY"
. When theidentity_provider
is"SPECIFIC_IDP"
then the second new argument,identity_provider_ids
, would be used to specify a list of ids of identity providers.References
The text was updated successfully, but these errors were encountered: