Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support connection strategy pingfederate #428

Closed
1 task done
vyrwu opened this issue Jan 9, 2023 · 2 comments
Closed
1 task done

Support connection strategy pingfederate #428

vyrwu opened this issue Jan 9, 2023 · 2 comments
Labels
🌱 feature New feature or request

Comments

@vyrwu
Copy link

vyrwu commented Jan 9, 2023

Checklist

Describe the problem you'd like to have solved

I'd like to have auth0_connection resource support pingfederate strategy.

Seems like the validation should succeede, so I'm not sure why this exception is thrown.

resource "auth0_connection" "pf" {
  name                 = "pf"
  strategy             = "pingfederate"
  is_domain_connection = false
  options {
    signing_cert = aws_ssm_parameter.signing_cert.value
  }
}

> tf apply --auto-approve
│ Error: Unsupported Connection Strategy
│ 
│   with auth0_connection.koch,
│   on connections.tf line 13, in resource "auth0_connection" "pf":
│   13:   strategy             = "pingfederate"

Describe the ideal solution

Auth0 Connections API supports it.

Alternatives and current workarounds

No response

Additional context

No response

@vyrwu vyrwu added the 🌱 feature New feature or request label Jan 9, 2023
@vyrwu
Copy link
Author

vyrwu commented Jan 9, 2023

@sergiught
Copy link
Contributor

Hey @vyrwu 👋🏻

Ping Federate Connections are now supported in the latest release v0.45.0. Please give it a go and let us know if you have any issues with it. Thanks!

Docs: https://registry.terraform.io/providers/auth0/auth0/0.45.0/docs

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
🌱 feature New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants