-
Notifications
You must be signed in to change notification settings - Fork 301
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Unable to Create Enterprise Application with SAML #806
Comments
For single tenant applications, adding or updating the AppId URI validates that the domain in the HTTPS scheme URI is listed in the verified domain list in the customer tenant or that the value uses the default scheme (api://{appId}) provided by Azure AD. This could prevent applications from adding an AppId URI if the domain isn't in the verified domain list or the value doesn't use the default scheme. To find more information on verified domains, refer to the custom domains documentation. https://docs.microsoft.com/en-us/azure/active-directory/develop/reference-breaking-changes So change your identifier uris to follow api scheme or add the domain as verified. |
Does the workaround described in #797 work for you? |
@7326922 Thanks, it does indeed. I'll close this for now and put a +1 on that issue. For my use case, I'm going to abuse |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Community Note
Terraform (and AzureAD Provider) Version
Terraform: 1.1.9
AzureAD Provider: 2.22.0
Affected Resource(s)
azuread_application
Terraform Configuration Files
Debug Output
https://gist.github.com/thebeanogamer/d61a453bbead8c6d04532e3e63d45b24
Expected Behavior
Terraform should create an enterprise application with the following SAML configuration:
Actual Behavior
Steps to Reproduce
terraform apply
References
Based on https://docs.microsoft.com/en-us/graph/application-saml-sso-configure-api, I believe the attribute names are correct, but they may well not be.
I get the impression that Terraform might not be creating a single-tenant enterprise application, which is why Azure is rejecting it. Unfortunately I don't know enough about the Azure AD API to say for certain.
The text was updated successfully, but these errors were encountered: