You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: website/content/api-docs/secret/azure.mdx
+31-6Lines changed: 31 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -41,9 +41,34 @@ service principals. Environment variables will override any parameters set in th
41
41
Active Directory API which has been [deprecated by Microsoft and will be removed in 2022](https://docs.microsoft.com/en-us/graph/migrate-azure-ad-graph-faq).
42
42
43
43
If set to true, the user specified via the `client_id` and `client_secret` will need to have the following permissions
44
-
under the Microsoft Graph API: `Application.ReadWrite.All`, `Directory.ReadWrite.All`, and `Group.ReadWrite.All`.
44
+
under the **Microsoft Graph API**:
45
+
46
+
| Permission Name | Type |
47
+
| ----------------------------- | ----------- |
48
+
| Application.Read.All | Application |
49
+
| Application.ReadWrite.All | Application |
50
+
| Application.ReadWrite.OwnedBy | Application |
51
+
| Directory.Read.All | Application |
52
+
| Directory.ReadWrite.All | Application |
53
+
| Group.Read.All | Application |
54
+
| Group.ReadWrite.All | Application |
55
+
| GroupMember.Read.All | Application |
56
+
| GroupMember.ReadWrite.All | Application |
57
+
58
+
| Permission Name | Type |
59
+
| -------------------------- | --------- |
60
+
| Application.Read.All | Delegated |
61
+
| Application.ReadWrite.All | Delegated |
62
+
| Directory.AccessAsUser.All | Delegated |
63
+
| Directory.Read.All | Delegated |
64
+
| Directory.ReadWrite.All | Delegated |
65
+
| Group.Read.All | Delegated |
66
+
| Group.ReadWrite.All | Delegated |
67
+
| GroupMember.Read.All | Delegated |
68
+
| GroupMember.ReadWrite.All | Delegated |
69
+
70
+
Aside from the permissions listed above, setting this to true should be transparent to users.
45
71
46
-
Aside from the permissions listed above, setting this to true should be transparent to users.
47
72
-`root_password_ttl``(string: 182d)` - Specifies how long the root password is valid for in Azure when
48
73
rotate-root generates a new client secret. This can be either a number of seconds or a time formatted
49
74
duration (ex: 24h, 48d).
@@ -172,11 +197,11 @@ This endpoint generates a new client secret for the root account defined in the
172
197
value generated will only be known by Vault.
173
198
174
199
~> Due to the eventual consistency of Microsoft Azure client secret APIs, the plugin
175
-
may briefly stop authenticating to Azure as the password propagates through their
176
-
datacenters.
200
+
may briefly stop authenticating to Azure as the password propagates through their
0 commit comments