Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We鈥檒l occasionally send you account related emails.

Already on GitHub? Sign in to your account

azurerm_key_vault --> enable_rbac_authorization doesn't work?! #25988

Open
1 task done
thatdotnetguy opened this issue May 16, 2024 · 0 comments
Open
1 task done

azurerm_key_vault --> enable_rbac_authorization doesn't work?! #25988

thatdotnetguy opened this issue May 16, 2024 · 0 comments

Comments

@thatdotnetguy
Copy link

Is there an existing issue for this?

  • I have searched the existing issues

Community Note

  • Please vote on this issue by adding a 馃憤 reaction to the original issue to help the community and maintainers prioritize this request
  • Please do not leave "+1" or "me too" comments, they generate extra noise for issue followers and do not help prioritize the request
  • If you are interested in working on this issue or have submitted a pull request, please leave a comment and review the contribution guide to help.

Terraform Version

1.8.3

AzureRM Provider Version

3.100.0

Affected Resource(s)/Data Source(s)

azurerm_key_vault

Terraform Configuration Files

resource "azurerm_key_vault" "keyvault" {
  name                        = var.name
  location                    = var.location
  resource_group_name         = var.resource_group_name
  tenant_id                   = var.tenant_id
  public_network_access_enabled = false
  enable_rbac_authorization   = true
  soft_delete_retention_days  = 7
  purge_protection_enabled    = false
  sku_name = "standard"
}

Debug Output/Panic Output

Output says it's all rainbows...

  # module.contractreview_keyvault.azurerm_key_vault.keyvault will be created
  + resource "azurerm_key_vault" "keyvault" {
      + access_policy                 = (known after apply)
      + enable_rbac_authorization     = true
      + id                            = (known after apply)
      + location                      = "australiaeast"
      + name                          = "myprojectname-develop-contracts"
      + public_network_access_enabled = false
      + purge_protection_enabled      = false
      + resource_group_name           = "myprojectname-develop"
      + sku_name                      = "standard"
      + soft_delete_retention_days    = 7
      + tenant_id                     = "***"
      + vault_uri                     = (known after apply)
    }

Plan: 1 to add, 0 to change, 0 to destroy.
module.contractreview_keyvault.azurerm_key_vault.keyvault: Creating...
module.contractreview_keyvault.azurerm_key_vault.keyvault: Creation complete after 6s [id=/subscriptions/***/resourceGroups/myprojectname-develop/providers/Microsoft.KeyVault/vaults/myprojectname-develop-contracts]

Apply complete! Resources: 1 added, 0 changed, 0 destroyed.

Expected Behaviour

In portal --> created key vault --> Access configuration should be set to "Azure role-based access control (recommended"

image

Actual Behaviour

Vault access policy is set instead

Steps to Reproduce

resource "azurerm_key_vault" "keyvault" {
name = var.name
location = var.location
resource_group_name = var.resource_group_name
tenant_id = var.tenant_id
public_network_access_enabled = false
enable_rbac_authorization = true
soft_delete_retention_days = 7
purge_protection_enabled = false
sku_name = "standard"
}

Important Factoids

No

References

No

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant