-
Notifications
You must be signed in to change notification settings - Fork 300
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Authentication strength in Conditional Access Policies #944
Comments
I'd like to work on this if no one else is doing it 🙋 |
Hi @g-psantos, thank you very much for the detailed feature request and the documentation links. We'd like to support this addition to conditional access policies in the provider, however this will unfortunately have to wait until the feature is made generally available. Whilst we can often support preview/beta features in this provider, the main exception to this is with conditional access policies. If an existing policy is updated using the beta API, this unfortunately incurs a breaking change and that policy can no longer be managed with the stable API until it is deleted and replaced. As such, we are precluded from using the beta API for CA policies as this will break a lot of existing users. Accordingly, I have marked this feature as blocked for now, but once this becomes generally available in the v1.0 API, we should be able to add support for it. |
Just a heads up that MS has announced GA for this feature today |
@manicminer This has been out of preview for almost a month. Can you provide an update? |
@catorar It still isn't supported by the |
@eda364 my bad - I was looking at the Conditional Access authentication strength page which still uses the beta API paths. You're correct, the v1.0 API is now supported. |
@manicminer Thank you for helping with this, but do we have an eta of when this would be ready? This would be super useful to us! |
Community Note
Description
This is a feature request for authentication strength to be supported by Terraform-managed Conditional Access Policies. From the Microsoft documentation:
As traditional authentication factors like SMS and push notifications become vulnerable to attack vectors such as SIM swapping and push notification fatigue, organizations must increasingly adopt phishing-resistant authenticators such as FIDO2 keys. The authentication strength grant control in Azure AD's Conditional Access Policies enables administrators to configure policies to that effect.
Note that the authentication strength API endpoints are still in public preview. However, given the value offered by this control, it would be great if the Terraform provider could offer it before it reaches GA.
New or Affected Resource(s)
azuread_conditional_access_policy
should be updated to include anauthentication_strength_policy
attribute undergrant_controls
azuread_authentication_strength_policy
should be added as a resourcedata.azuread_authentication_strength_policy
should be added as a data sourcePotential Terraform Configuration
References
The text was updated successfully, but these errors were encountered: