Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

middle half of a tf for oidc workshop article #1415

Draft
wants to merge 4 commits into
base: main
Choose a base branch
from

Conversation

edunham
Copy link
Member

@edunham edunham commented Aug 2, 2023

todo:

  • figure out what's up with the one "identity provider" listed at https://ACCOUNTID-admin.okta.com/admin/access/identity-providers# calls itself okta-devok12
    image

  • is there a name for the IdP with the URL of our dev org? how would we have found it? (if there is, we can skip looking up the okta_auth_server entirely and just get the issuer from the actual idp)

  • after establishing how we're getting the IdP metadata, retcon the scopes situation (auth server needs one read scope, idp needs different read scope, whatever ends up getting used needs instructions to grant the scope in both terraform and the console

  • should this whole thing happen after the "yo dawg i heard you like terraform" (managing tf's app from tf) post? that would skip some of the clicking to grant more scopes

  • fix intro (not worth the hassle till I figure out what parts of the attempted code are possible, IMO)

  • fix conclusion/CTA

  • someday in the distant future, copyediting and SEO tweaks, but that's after it's actually written

@netlify
Copy link

netlify bot commented Aug 2, 2023

Deploy Preview for okta-blog ready!

Name Link
🔨 Latest commit 834bc27
🔍 Latest deploy log https://app.netlify.com/sites/okta-blog/deploys/64cc2dcf75180d00087f94b2
😎 Deploy Preview https://deploy-preview-1415--okta-blog.netlify.app
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.

To edit notification comments on pull requests, go to your Netlify site configuration.

[docs](https://registry.terraform.io/providers/okta/okta/latest/docs/data-sources/idp_oidc)
```tf
data "okta_idp_oidc" "default" {
name = ""
Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this does not work with 'default', and gives the okta-devok12 values when filled out to "Developer Registration SSO", which is the only IdP in the IdP list in my console
image

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Are you using a Developer account?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

yeah, dev account in the OK12 cell, which is where I think it's getting the ok12 string in the "wrong" URLs from :)

#### Metadata URI
[docs](https://registry.terraform.io/providers/okta/okta/latest/docs/data-sources/idp_oidc)
```tf
data "okta_idp_oidc" "default" {
Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this may not be the correct TF data source to use. I feel like it should be https://registry.terraform.io/providers/okta/okta/latest/docs/data-sources/idp_oidc because there doesn't seem to be anything more appropriate in the data sources list, and it offers all the outputs I want from it, but I've never actually seen something like this succeed so my guess about its applicability could be the problem.

@edunham edunham requested a review from aaronpk August 2, 2023 19:13
@edunham
Copy link
Member Author

edunham commented Dec 8, 2023

devok12 thing is because that's the tenant my dev account lives in, as shown at the bottom of the page
image

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants