Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

azuread_user: Support for "PasswordNeverExpire" option #136

Closed
lzadjsf opened this issue Aug 15, 2019 · 9 comments · Fixed by #550
Closed

azuread_user: Support for "PasswordNeverExpire" option #136

lzadjsf opened this issue Aug 15, 2019 · 9 comments · Fixed by #550

Comments

@lzadjsf
Copy link

lzadjsf commented Aug 15, 2019

Community Note

  • Please vote on this issue by adding a 👍 reaction to the original issue to help the community and maintainers prioritize this request
  • Please do not leave "+1" or "me too" comments, they generate extra noise for issue followers and do not help prioritize the request
  • If you are interested in working on this issue or have submitted a pull request, please leave a comment

Description

Times to times there is a need to set password never expire for Azure AD user account as it is a service account. It need to applications that still doesn't support latest authentication and authorisation mechanisms. Say, services which requires for LDAP bindings through Azure Active Directory Domain Services.

It can be easily done by PowerShell command:

Set-MsolUser -UserPrincipalName <user ID> -PasswordNeverExpires $true

By the way, there is a need to perform that kind of task through TF scripts during automatic deployment of service.

New or Affected Resource(s)

  • azuread_user

Potential Terraform Configuration

resource "azuread_user" "example" {
  user_principal_name = "[email protected]"
  display_name        = "J. Doe"
  mail_nickname       = "jdoe"
  password            = "SecretP@sswd99!"
  password_expiration  ="True|False"
}

References

@lzadjsf
Copy link
Author

lzadjsf commented Aug 27, 2019

Hello,

Any news?

@katbyte
Copy link
Collaborator

katbyte commented Oct 11, 2019

Hi @lzadjsf,

Thank you for opening this issue so we can track this feature. As that property is currently not exposed but the SDK this is not on our current roadmap to implement anytime soon.

@katbyte
Copy link
Collaborator

katbyte commented Mar 11, 2020

This might be possible via the additional properties map.. 🤔

@dbourcet-wiz
Copy link

@katbyte What do you mean by the additionnal properties map? It does interest me.

@manicminer
Copy link
Contributor

This is supported by the Azure AD Graph API. I have logged an issue requesting SDK support.

Azure/azure-sdk-for-go#9851

@manicminer manicminer added this to the v2.0.0 milestone May 27, 2021
@manicminer manicminer modified the milestones: v2.0.0, v2.1.0 Jul 21, 2021
@manicminer manicminer modified the milestones: v2.1.0, v2.2.0 Sep 2, 2021
@alexwilcox9
Copy link
Contributor

@manicminer for this one would you rather have an attribute called password_policies which is a string that can be set to DisableStrongPassword, DisablePasswordExpiration or DisablePasswordExpiration, DisableStrongPassword

Or would you prefer to have two Boolean attributes that we then use to construct the above string to send to the API?

https://docs.microsoft.com/en-us/graph/api/resources/user?view=graph-rest-1.0#properties

@manicminer
Copy link
Contributor

@alexwilcox9 Given this is an enumeration string with exclusivity rules, it would probably be best implemented as booleans in the provider so we can validate them nicely 👍

@github-actions
Copy link

This functionality has been released in v2.2.0 of the Terraform Provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading.

For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template. Thank you!

@github-actions
Copy link

I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.
If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.

@github-actions github-actions bot locked as resolved and limited conversation to collaborators Oct 10, 2021
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

Successfully merging a pull request may close this issue.

5 participants