-
Notifications
You must be signed in to change notification settings - Fork 215
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Enable okta_password
authenticator for okta_policy_mfa
#1210
Conversation
Enable synchronising and setting `okta_password` authenticator configuration.
@nickrmc83 Are you testing in an OIE environment? I believe the changes above will break and not-work in an OIE tenant. Enabling password breaks sync as okta_password isn't returned by the API as noted in the comments. I'll try to take a look to see if I can confirm |
Thanks for the PR @nickrmc83 I'll have to look into this later this week. Thanks the extra experience @virgofx - I will definitely first see if the ITs for |
Yes we are. I'm trying to enable |
@nickrmc83 if you rebase master you'll get this commit 4071493 . It adds a feature where the provider discovers if it is running against an OIE or classic org and saves that as a boolean on the provider config
|
@monde I've merged the latest head into my remote branch 👍 |
I need this as well. I work in an 'is_oie = 1' tenant and this change will work for me. A recap of this commit:
|
@monde is there likely to be any movement on this issue? |
Okta internal reference https://oktainc.atlassian.net/browse/OKTA-532535 |
@nickrmc83 I want to spend some time looking into this further given the classic/oie impact and have triaged it into our internal backlog. |
"I want to spend some time looking into this further given the classic/oie impact and have triaged it into our internal backlog" Your original work (prior to this PR) was very intentional about not allowing this. I'm not sure what inspired you to block this functionality (perhaps out-of-date docs, or other information that's no longer relevant). The Okta admin console clearly functions the same as this PR. Please let me know if any of the following would make you feel better about the PR:
The Okta platform is in a state of flux. I'm hoping you're not over-thinking this, or trying to divine the platform's long-term intentions. It's better to be nimble and exact at this point. I'm using a custom build with this PR as we speak. I need to share share my terraform scripts with others, so they have to use my custom build as well. It would be much easier if this PR could be part of your release, so I don't have to manually distribute the provider. Would it be possible to integrate this PR but have a command-line flag to turn the controversial functionality on/off? |
@monde is there any more we can do to move this forward? We'd like to get back to using a mainline release. |
I'll try to dedicate time to look at this in my current sprint. |
@monde sorry to push but the lack of support for configuring password + Okta Verify using an official release is now causing us challenges. Do you have a timeline when this will be possible? |
Hi - commenting to add to the general feedback on this issue. We are unable to use Terraform to create/configure MFA enrollment policies in OIE without receiving this error and have tried many workarounds, combinations to try resolve without success. We've had to go back to manually configuring MFA enrolment policies until a fix is available. |
I'll be bringing @nickrmc83's work in under PR #1427 |
Forgot to shout this was released in https://github.com/okta/terraform-provider-okta/releases/tag/v3.41.0 |
Enable synchronising and setting
okta_password
authenticator configuration onokta_policy_mfa
resources. See previous issue comment for more context. I've not had a chance to extensively test this fix yet and so should be treated as speculative at this point.It should allow for policies such as the below to work with OIE without encountering a
At least one of Password or Email authenticator must be set to required
error: