-
Notifications
You must be signed in to change notification settings - Fork 18
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feature: Allow managing of service account roles #43
Comments
Thank you for fast implementation! I will test those and report back here today/tomorrow. |
I can confirm both resources to work. It took me a while to realize, that in ClientServiceAccountRole the .spec.forProvider.clientId is not the configured client id of a client, but actually the Keycloak's internal uuid for that client. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Currently the provider doesn't seem to support managing client Service Account's roles. Same capability is provided on Terraform side via openid_client_service_account_realm_role and openid_client_service_account_role.
This feature would make it possible to configure Client that relies on Client Credentials Grant with roles.
The text was updated successfully, but these errors were encountered: