You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We use OIDC for login to the web-ui as well as for the cli. We would like to use the same login method when running terraform locally currently we need to configure an additional id/key based auth-method for each engineer and make sure the permissions match.
Would it be possible to add the oidc login method to the provider and configure it like this:
provider "akeyless" {
api_gateway_address = "https://api.akeyless.io"
oidc_login {
access_id = "" // get it also from ENV variable AKEYLESS_AUTH_OIDC_ACCESS_ID
oidc_token ="" // get it also from ENV variable AKEYLESS_AUTH_OIDC_TOKEN
}
}
I'm having two ideas in mind for the actual implementation of the authentication:
Use the cached credential from the CLI for the same access_id
Add a second parameter to the oidc_login schema "oidc_token" where the token can be added
The text was updated successfully, but these errors were encountered:
We use OIDC for login to the web-ui as well as for the cli. We would like to use the same login method when running terraform locally currently we need to configure an additional id/key based auth-method for each engineer and make sure the permissions match.
Would it be possible to add the oidc login method to the provider and configure it like this:
I'm having two ideas in mind for the actual implementation of the authentication:
The text was updated successfully, but these errors were encountered: