Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This is a sample for configuring AzureAD with Rode.
Notes
aud
claim is the Rode client id (with the v1 format theaud
claim is the identifier uri). The token version can't be set through Terraform until the next major version of the provider is released.aud
of00000003-0000-0000-c000-000000000000
).${RODE_CLIENT_ID}/.default
(not theapi://rode/rode
scope). The response doesn't include a refresh token.Manual Configuration
There a few manual steps outside of Terraform that don't seem possible to automate:
App Configuration
Rode
To run Rode with AzureAD:
The value of
--oidc-role-claim-path
is the default and could be omitted, but it's here for completeness.Rode UI
The important thing to note is the value of
OIDC_SCOPE
; it must include whatever scope was defined on the Rode app registration, or the app roles won't be in the token. It should also include theoffline_access
scope, otherwise the token set won't include a refresh token.