Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Terraform resource "okta_inline_hook" with type "com.okta.saml.tokens" does not support OAuth 2.0 authentication even if API and Admin UI does #2190

Open
deepaunni2006 opened this issue Jan 24, 2025 · 2 comments
Labels
bug triaged Triaged into internal Jira

Comments

@deepaunni2006
Copy link

Description:

Community Note

  • Please vote on this issue by adding a 👍 reaction to the original issue to help the community and maintainers prioritize this request

  • Please do not leave "+1" or other comments that do not add relevant new information or questions, they generate extra noise for issue followers and do not help prioritize the request

  • If you are interested in working on this issue or have submitted a pull request, please leave a comment

Terraform Version

okta = {

  source  = "okta/okta"

  version = "~> 4.13.0" --

}



okta = {

  source  = "okta/okta"

  version = "~> 4.5.0"

}

every version

Affected Resource(s)

  • okta_inline_hook

  • type "com.okta.saml.tokens"

Terraform Configuration Files

# Copy-paste your Terraform configurations here - for large Terraform configs,

# please use a service like Dropbox and share a link to the ZIP file. For

# security, you can also encrypt the files using our GPG public key: [https://keybase.io/hashicorp](https://urldefense.com/v3/__https://keybase.io/hashicorp__;!!PwKahg!9gh41yliulSPgUn3l9s8ylKYIB5aDI0e1js2S1AMjLJMra2LsscvA5ase601oe5XWBic6aRhpl07kSnZhoi1$)

 

 

resource "okta_inline_hook" "saml_hooks" {

  for_each = toset(var.app1_tenants)

  name     = "saml-${each.key}-app1-hook"

  type     = "com.okta.saml.tokens.transform"

  version  = "1.0.2"

  status   = "ACTIVE"

 

  channel = {

    type    = "HTTP"

    version = "1.0.0"

    method = "POST"

    uri     = var.hook_service_url

  }

 

  auth = {

    key = "Authorization"

    type = "OAUTH2"

    value = jsonencode({

        client_id     = var.hook_client_id

        client_secret = var.hook_secret

        token_url     = var.hook_token_url

        scope         = "api"

    })

  }

 

}

Debug Output

Panic Output

Expected Behavior

Can this be done in the Admin UI?

Can this be done in the actual API call?

Actual Behavior

Steps to Reproduce

  1. TF_LOG=DEBUG terraform apply -auto-approve okta_plan.tfplan

Important Factoids

References

  • #0000
@deepaunni2006
Copy link
Author

Opened this on behalf of a customer

@monde monde added bug enhancement Asking for new behavior or feature labels Jan 28, 2025
@monde
Copy link
Collaborator

monde commented Jan 28, 2025

@deepaunni2006 can you get the error output from the TF provider, it will help deduce the issue if I'm not able to reproduce this given the sparse background given in the issue. Thanks

https://oktainc.atlassian.net/browse/OKTA-858195

@monde monde added triaged Triaged into internal Jira and removed enhancement Asking for new behavior or feature labels Jan 28, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug triaged Triaged into internal Jira
Projects
None yet
Development

No branches or pull requests

2 participants