You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
<!-- Please do not edit this file, it is generated. -->
10
+
# Data Source: tfe_saml_settings
11
+
12
+
Use this data source to get information about SAML Settings. It applies only to Terraform Enterprise and requires admin token configuration. See example usage for incorporating an admin token in your provider config.
13
+
14
+
15
+
## Example Usage
16
+
17
+
Basic usage:
18
+
19
+
```hcl
20
+
provider "tfe" {
21
+
hostname = var.hostname
22
+
token = var.token
23
+
}
24
+
25
+
provider "tfe" {
26
+
alias = "admin"
27
+
hostname = var.hostname
28
+
token = var.admin_token
29
+
}
30
+
31
+
data "tfe_saml_settings" "foo" {
32
+
provider = tfe.admin
33
+
}
34
+
```
35
+
36
+
## Argument Reference
37
+
38
+
No arguments are required for this data source.
39
+
40
+
## Attributes Reference
41
+
42
+
The following attributes are exported:
43
+
44
+
*`Id` - It is always `Saml`.
45
+
*`Enabled` - Whether SAML single sign-on is enabled.
46
+
*`Debug` - Whether debug mode is enabled, which means that the SAMLResponse XML will be displayed on the login page.
47
+
*`TeamManagementEnabled` - Whether Terraform Enterprise is set to manage team membership.
48
+
*`AuthnRequestsSigned` - Whether `<samlp:AuthnRequest>` messages are signed.
49
+
*`WantAssertionsSigned` - Whether `<saml:Assertion>` elements are signed.
50
+
*`IdpCert` - PEM encoded X.509 Certificate as provided by the IdP configuration.
51
+
*`OldIdpCert` - Previous version of the PEM encoded X.509 Certificate as provided by the IdP configuration.
52
+
*`SloEndpointUrl` - Single Log Out URL.
53
+
*`SsoEndpointUrl` - Single Sign On URL.
54
+
*`AttrUsername` - Name of the SAML attribute that determines the user's username.
55
+
*`AttrGroups` - Name of the SAML attribute that determines team membership.
56
+
*`AttrSiteAdmin` - Site admin access role.
57
+
*`SiteAdminRole` - Site admin access role.
58
+
*`SsoApiTokenSessionTimeout` - Single Sign On session timeout in seconds.
59
+
*`AcsConsumerUrl` - ACS Consumer (Recipient) URL.
60
+
*`MetadataUrl` - Metadata (Audience) URL.
61
+
*`Certificate` - Request and assertion signing certificate.
62
+
*`Certificate` - Request and assertion signing certificate.
63
+
*`PrivateKey` - The private key used for request and assertion signing.
Copy file name to clipboardExpand all lines: website/docs/cdktf/csharp/index.html.markdown
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,6 +5,8 @@ description: |-
5
5
Provision Terraform Cloud or Terraform Enterprise - with Terraform! Management of organizations, workspaces, teams, variables, run triggers, policy sets, and more. Maintained by the Terraform Cloud team at HashiCorp.
6
6
---
7
7
8
+
9
+
<!-- Please do not edit this file, it is generated. -->
8
10
# Terraform Cloud/Enterprise Provider
9
11
10
12
This provider is used to interact with the many resources supported by
@@ -127,4 +129,4 @@ The following arguments are supported:
127
129
arguments. Ensure that the organization already exists prior to using this argument.
128
130
This can also be specified using the `TfeOrganization` environment variable.
<!-- Please do not edit this file, it is generated. -->
10
+
# tfe_saml_settings
11
+
12
+
Use this resource to create, update and destroy SAML Settings. It applies only to Terraform Enterprise and requires admin token configuration. See example usage for incorporating an admin token in your provider config.
*`IdpCert` - (Required) Identity Provider Certificate specifies the PEM encoded X.509 Certificate as provided by the IdP configuration.
36
+
*`SloEndpointUrl` - (Required) Single Log Out URL specifies the HTTPS endpoint on your IdP for single logout requests. This value is provided by the IdP configuration.
37
+
*`SsoEndpointUrl` - (Required) Single Sign On URL specifies the HTTPS endpoint on your IdP for single sign-on requests. This value is provided by the IdP configuration.
38
+
*`Debug` - (Optional) When sign-on fails and this is enabled, the SAMLResponse XML will be displayed on the login page.
39
+
*`AuthnRequestsSigned` - (Optional) Whether to ensure that `<samlp:AuthnRequest>` messages are signed.
40
+
*`WantAssertionsSigned` - (Optional) Whether to ensure that `<samlp:Assertion>` elements are signed.
41
+
*`TeamManagementEnabled` - (Optional) Set it to false if you would rather use Terraform Enterprise to manage team membership.
42
+
*`AttrUsername` - (Optional) Username Attribute Name specifies the name of the SAML attribute that determines the user's username.
43
+
*`AttrSiteAdmin` - (Optional) Specifies the role for site admin access. Overrides the `Site Admin Role` method.
44
+
*`AttrGroups` - (Optional) Team Attribute Name specifies the name of the SAML attribute that determines team membership.
45
+
*`SiteAdminRole` - (Optional) Specifies the role for site admin access, provided in the list of roles sent in the Team Attribute Name attribute.
46
+
*`SsoApiTokenSessionTimeout` - (Optional) Specifies the Single Sign On session timeout in seconds. Defaults to 14 days.
47
+
*`Certificate` - (Optional) The certificate used for request and assertion signing.
48
+
*`PrivateKey` - (Optional) The private key used for request and assertion signing.
49
+
*`SignatureSigningMethod` - (Optional) Signature Signing Method. Must be either `Sha1` or `Sha256`. Defaults to `Sha256`.
50
+
*`SignatureDigestMethod` - (Optional) Signature Digest Method. Must be either `Sha1` or `Sha256`. Defaults to `Sha256`.
51
+
52
+
## Attributes Reference
53
+
54
+
*`Id` - The ID of the SAML Settings. Always `Saml`.
Copy file name to clipboardExpand all lines: website/docs/cdktf/csharp/r/team_project_access.html.markdown
+79-2Lines changed: 79 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,6 +5,8 @@ description: |-
5
5
Associate a team to permissions on a project.
6
6
---
7
7
8
+
9
+
<!-- Please do not edit this file, it is generated. -->
8
10
# tfe_team_project_access
9
11
10
12
Associate a team to permissions on a project.
@@ -49,7 +51,82 @@ The following arguments are supported:
49
51
50
52
*`TeamId` - (Required) ID of the team to add to the project.
51
53
*`ProjectId` - (Required) ID of the project to which the team will be added.
52
-
*`Access` - (Required) Type of fixed access to grant. Valid values are `Admin`, `Maintain`, `Write`, or `Read`.
54
+
*`Access` - (Required) Type of fixed access to grant. Valid values are `Admin`, `Maintain`, `Write`, `Read`, or `Custom`.
55
+
56
+
## Custom Access
57
+
58
+
If using `Custom` for `Access`, you can set the levels of individual permissions
59
+
that affect the project itself and all workspaces in the project, by using `ProjectAccess` and `WorkspaceAccess` arguments and their associated permission attributes. When using custom access, if attributes are not set they will be given a default value. Some permissions have values that are specific "strings" that denote the level of the permission, while other permissions are simple booleans.
60
+
61
+
The following permissions apply to the project itself.
|`Runs`| The permission to grant project's workspaces' runs. Default: `Read`. Valid strings: `Read`, `Plan`, or `Apply`. |
77
+
|`SentinelMocks`| The permission to grant project's workspaces' Sentinel mocks. Default: `None`. Valid strings: `None`, or `Read`. |
78
+
|`StateVersions`| The permission to grant project's workspaces' state versions. Default: `None` Valid strings: `None`, `ReadOutputs`, `Read`, or `Write`.|
79
+
|`Variables`| The permission to grant project's workspaces' variables. Default `None`. Valid strings: `None`, `Read`, or `Write`. |
80
+
|`Create`| The permission to create project's workspaces in the project. Default: `False`. Valid booleans `True`, `False`|
81
+
|`Locking`| The permission to manually lock or unlock the project's workspaces. Default `False`. Valid booleans `True`, `False`|
82
+
|`Delete`| The permission to delete the project's workspaces. Default: `False`. Valid booleans: `True`, `False`|
83
+
|`Move`| This permission to move workspaces into and out of the project. The team must also have permissions to the project(s) receiving the the workspace(s). Default: `False`. Valid booleans: `True`, `False`|
84
+
|`RunTasks`| The permission to manage run tasks within the project's workspaces. Default `False`. Valid booleans: `True`, `False`|
85
+
86
+
87
+
## Example Usage with Custom Project Permissions
88
+
89
+
```csharp
90
+
usingConstructs;
91
+
usingHashiCorp.Cdktf;
92
+
/*Provider bindings are generated by running cdktf get.
93
+
See https://cdk.tf/provider-generation for more details.*/
0 commit comments