-
Notifications
You must be signed in to change notification settings - Fork 325
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
allow for mapping roles to users and service accounts #152
Comments
Totally makes sense, I like the simplicity 👍 |
LGTM! |
I am looking into this a little as my first try with go and Terraform development since we need it for at project. While my need is also for a service account, would it be better for the datasource to be for a generic keycloak user, not just a service account? You could still get the service account user from the naming convention, but it would be possible to apply it broader. |
Hi @dimsedane, thanks for wanting to contribute! Feel free to post any questions you may have here along the way, I'll be happy to help. I had initially considered a more generic |
Thank for the idea @mrparkers. Would it better for the resource "keycloak_openid_client" to output an attribute |
Any chance to get this going? We would need this. |
Looks like this is being worked on in #247 |
Discussion started in #143.
For mapping roles to a service account, it makes sense to make to have a data source to get the ID of that service account, and use a resource like
keycloak_user_roles
to map roles to it. It might look something like this:thoughts? cc @rlewan @camelpunch
The text was updated successfully, but these errors were encountered: