You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.
If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. If you feel I made an error 🤖 🙉 , please reach out to my human friends 👉 [email protected]. Thanks!
ghost
locked and limited conversation to collaborators
May 4, 2020
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
This issue was originally opened by @emacdona as hashicorp/terraform#24543. It was migrated here as a result of the provider split. The original body of the issue is below.
Current Terraform Version
Use-cases
According to the docs (and my experience) a service_principal is required to authenticate when using azurerm_kubernetes_cluster
(https://www.terraform.io/docs/providers/azurerm/r/kubernetes_cluster.html)
This is a problem for me as I am not a subscription owner for my subscription. The account I was given cannot add role assignments... which is the last step in creating a service_principal (https://www.terraform.io/docs/providers/azurerm/guides/service_principal_client_secret.html#creating-a-service-principal-in-the-azure-portal)
Proposal
Would it be possible to use this feature via CLI authentication?
(https://www.terraform.io/docs/providers/azurerm/guides/azure_cli.html)
The text was updated successfully, but these errors were encountered: